Somebody has been breaking in into voter record and voting related systems in the US, in two incidents, which may or may not be related. The tools used have self-identified as common off the shelf vulnerability scanner tools, and the servers used are common publicly rentable virtual private server instances.
Somebody is using this to construct a fear-narrative of potential US voting manipulation, which may or may not be based in reality. Also, the attribution of the tools and players is based on User-Agent strings and other attributed the attacker actually could control.
The whole thing does not make sense under almost any interpretation. The tools and servers used are as plain as possible, and the tools used have a high visibility footprint - they are tools used for vulnerability scanning with permission or used by script kiddies. They are like the opposite of the tools the Equation Group uses to compromise systems, and there is no reason other Nation State Attackers are less sophisticated.
The connection between the incidents is inferred as well, and that fits better into the whole context of this being a construction to raise fear than this being an actual attack.
Having said that, in the current climate of Hackerterrorcybercyber and state agencies hoarding exploits against their own nations software and hardware manufacturers products, NOT using electronic voting and vote-counting is probably an awesomely smart idea. The offlinier, the better, that is, provided you actually care about the outcome being exact.
An FBI memo citing information released by MS-ISAC says that foreign actors are using common scanning tools to locate vulnerable election systems. There is evidence to suggest, but not conclusively prove, that at least two incidents are connected to these scans.
Die rechtspopulistische Alternative für Deutschland (AfD) hätte gerne Beweise für die Gewalt von Ausländern und Linken in Deutschland gehabt. Dumm nur, dass von rechts die meisten Straftaten ausgingen.
The Cache Hierarchy, and how it affects data access times - using a cost model of O(sqrt(N)) predicts access times across many levels of hierarchy. Also, this is not a surprise if you think about the physics involved. Finally, locality of reference matters if caches are involved, but many of our programming tools are not really well equipped to leverage that. That means your life is complicated and your abstractions are leaky.
If you have studied computing science, then you know how to do complexity
analysis. You’ll know that iterating through a linked list is O(N), binary
search is O(log(N)) and a hash table lookup is O(1). What if I told you
that all of the above is wrong? What if I told you that iterating through a
linked list is actually O(N√N) and binary searches as well as hash lookups
both are O(√N)?
Am Wochenende wurden in Berlin 30 Schaukeln in der Stadt aufgehängt. Die selbstgebauten Holzschaukeln wurden an unterschiedlichen Orten im öffentlichen Raum von Kreuzberg aufgehängt. Geschaukelt werden kann seit Freitagabend auf der Oberbaumbrücke, im Weinbergspark und im Kreuzberger 3-Ländereck. Hinter der tollen Aktion steckt die anonyme Gruppe Einfach nur so aus Berlin: ein Kollektiv, dass mit Schaukeln mehr Spaß in den öffentlichen Raum bri...