“In the past year, I have searched for domestic and foreign manufacturers of IOT (Internet of Things), drones, and autonomous driving. No one discussed safety issues with me.” Founder and CEO of well-known white hat hacking team Keen (碁震) Wang Qi was emotional.

Wang Qi is nicknamed "Big Bullfrog" in the White Hat hacker. He is one of the founders and technical leaders of ChinaMSRC, the first regional security response center outside Microsoft's US headquarters. He is the first expert in vulnerability research in Microsoft Asia Pacific. Level researcher.

The group where Wang Qi is located is a group of “guardians of the Internet security community”. Their daily work is to find the background risks in online life, and at the same time break through and assist software and hardware manufacturers to block security holes in time. Recently, he has been exposed to a lot of artificial intelligence products, but he admits that people are artificial intelligence, unmanned, tall, can't get rid of our white hat hackers, think that hackers are pediatrics, then we reach out and reach one Enough, see what you can do.

At the GeekPwn2016 Carnival on October 24th, Stephen Chavez, who is known as "Little Hawking" in the field of Internet security and has 10 years of programming experience with cerebral palsy, showed his use of vulnerabilities to remotely control a stranger. Human smart wheelchair. At the same time, the Changting Technology team from Tsinghua University also demonstrated the jailbreak cracking for the PS4 game console.

It is worth noting that the world's first iPhone and Sony PS3 George Hotz (called GeoHot) also came to the scene to express his views on artificial intelligence.

Artificial intelligence security vulnerability

He said that despite 60 years of development, AI is still only a concept, did not enter a leap from 0 to 1, and automatic driving has not been realized. Now, his interest has shifted from the early breakthrough of the iPhone and Sony game consoles to the automotive field, and will release an autopilot hardware by the end of this year. He is not driving a car, but assisting driving technology.

"At present, Apple's security has improved a lot, and I don't need my help. But now it seems that the car manufacturers are stupid. At present, they are very beautiful, but they are not smart. They need it. My 'help'."

In addition to the display of artificial intelligence, smart devices also have a lot of highlights. A Phenix Coder team consisting of teachers and students from Southeast University and Macao University targeted the attackers to the smart sockets that were not visible in their lives. After the attack, they even let the smart socket release one.

Wang Qi said that a small smart socket can become a carrier for hackers to remotely control users' social media, and hackers can do more damage through this hardware.

There is also a student from the University of California, Santa Barbara, who demonstrated how to crack the fingerprint password of a newly opened Huawei mobile phone through code attacks. When the fingerprint is entered on this new mobile phone, the mobile phone's TrustZone area is broken, the mobile phone background can allow any fingerprint to pass the verification, and the attacker can even use the nose instead of the finger to unlock the mobile phone.

Huawei immediately stated that it carefully and carefully analyzed and repaired the vulnerabilities provided by the organizers to ensure the security of Huawei's mobile phone system. "For Huawei mobile phones that attach great importance to user security, security geeks break through." The demonstration is undoubtedly an important opportunity to improve product safety."

Wang Qi said that in recent years, artificial intelligence and functional life have developed rapidly, but Internet security awareness has not fared up, exposing many huge problems, affecting the security of many users, but some domestic hardware manufacturers are facing The attitude on security issues is changing. Wang Qi said that there are no smart products in the world that have no security holes at all, but the earlier security vulnerabilities are discovered and eliminated, the safer the smart products are. For the user, Wang Qi gives some suggestions. For example, if you can't confirm whether the public wifi in the hotel, Starbucks, etc. has been controlled by hackers, then try to use 3G or 4G network when uploading or downloading some important information. .

Children Decoration Led Night Light

Children Decoration Led Night Light advantage:

Creative LED Night Lights Nurse Baby Bedside Lamp LED Night Light,Small night light is a very lovely light product, cartoon modeling, light control products, LED light source, lighting more attractive, create a good dream atmosphere, but also provide light for the night.


Bedroom Lamps Cartoon PVC Plastic Sleep Led Kids Lamp Bulb Night Light for Children

Children Decoration Led Night Light,Children Led Night Light,Led Decoration Night,Led Decoration Night Lights

Dongguan City Leya Electronic Technology Co. Ltd , https://www.dgleya.com