EEG is chasing foamy waves


Meditation experiment with the Muse 2 headband


Picture of Muse 2 headband with branwave activity graph in the background

Every couple of years, there’s an increase in devices that enable individuals to measure the bioelectrical activity of their brains at home. These devices exploit the occurrence of fluctuating brain wave frequencies, which vary according to the user’s psychophysical state. Driven by a pandemic-induced fondness for my residence, I decided to purchase one of these gadgets. After several weeks, I sought to offer a subjective review of the chosen model and conduct an experiment using raw data.

Shellshock and the Story of the Environment


Graphic showing a black sphere in space

At the turn of September and October 2014 the world learned of a security vulnerability that had been lurking for years in the GNU Bourne Again Shell (a.k.a. Bash). Most IT-security outlets had already covered the topic and published appropriate remediation methods, yet what caught my attention was the educational aspect of the flaw – in that regard it is a “good bug”, that is, one that can be used to explain many interesting mechanisms present in Unix-like systems.

Bitsquatting


Cosmic radiation and breaking security


The photograph shows a UFO mock-up

When typing a website name into the browser’s address bar, mistakes sometimes happen. Instead of visiting the right site, we end up on a so-called domain parking page, or in a completely different service. There are also less safe situations—sites deceptively similar to the originals, used to siphon data or infect a computer with malware. Let’s imagine that a similar situation could occur even when the entered address was correct…

Evil Packages


Attacks Targeting Package Repositories


Photography of food packaging

Attacks that rely on setting up fake update servers are not as difficult to carry out as one might think. The main reasons are administrators’ carelessness and the absence of robust version-publishing processes, although occasionally we see astonishing attack vectors that are hard to anticipate.

Current section: RNA.