Realme RMX3366 Key Specifications Tipped via Geekbench Listing
Realme RMX3366 Key Specifications Tipped via Geekbench Listing

Realme RMX3366 – believed to be Realme X9 Pro – has surfaced on Geekbench, offering a glimpse into some of its key specifications. The benchmarking website suggests that the upcoming smartphone could be powered by the Snapdragon 870 SoC. The smartphone was earlier spotted on TENAA listing with the codename RMX3366 as well. A previous report speculates that the RMX3366 smartphone could be named Realme GT 5G Master Edition that could be jointly designed and developed with Japanese designer Naoto Fukasawa.

As per the listing on Geekbench, the Realme smartphone with codename RMX3366 scored 1,022 points in the single-core tests and 3,054 points in the multi-core tests. The listing also shows that the smartphone has a 1.80GHz octa-core processor along with 12GB of RAM. The motherboard has the codename “kona.” The Geekbench listing was first spotted by Nashville Chatter Class.

Qualcomm gave the “kona” codename to its Snapdragon 860, Snapdragon 865+, and the Snapdragon 870 processors. It is being speculated that the RMX3366 smartphone could come with the Snapdragon 870 SoC. The Geekbench listing also shows that the smartphone runs Android 11.

According to a previous report, Chinese sources have claimed that Realme RMX3366 could be the upcoming Realme GT 5G Master Edition, as opposed to earlier reports which state that it could be called Realme X9 Pro. The TENAA listing hints at some of the key specifications that are expected to arrive with the smartphone. It may sport a 6.55-inch full-HD+ OLED display, among others.

The smartphone is also speculated to launch in India as Realme India and Europe CMO Francis Wong tweeted a photo of the Realme Buds that carried a text at the bottom that read, “Shot on RMX3366.” Going by the model number and the tweet by Realme CMO, the smartphone is expected to launch in India soon.

Can Realme X7 Pro take on OnePlus Nord? We discussed this on Orbital, the Gadgets 360 podcast. Orbital is available on Apple Podcasts, Google Podcasts, Spotify, and wherever you get your podcasts.

Source link

Radar trends to watch: July 2021 – O’Reilly
Radar trends to watch: July 2021 – O’Reilly

Certainly the biggest news of the past month has been a continuation of the trend towards regulating the biggest players in the tech industry.  The US House of Representatives is considering 5 antitrust bills that would lead to major changes in the way the largest technology companies do business; and the Biden administration has appointed a new Chair of the Federal Trade Commission who will be inclined to use these regulations aggressively. Whether these bills pass in their current form, how they are challenged in court, and what changes they will lead to is an open question.  (Late note: Antitrust cases against Facebook by the FTC and state governments based on current law were just thrown out of court.)

Aside from that, we see AI spreading into almost every area of computing; this list could easily have a single AI heading that subsumes programming, medicine, security, and everything else.

Learn faster. Dig deeper. See farther.

AI and Data

  • A new algorithm allows autonomous vehicles to locate themselves using computer vision (i.e., without GPS) regardless of the season; it works even when the terrain is snow-covered.
  • An AI-based wildfire detection system has been deployed in Sonoma County. It looks for smoke plumes, and can monitor many more cameras than a human.
  • Researchers are investigating how racism and other forms of abuse enter AI models like GPT-3, and what can be done to prevent their appearance in the output. It’s essential for AI to “understand” racist content, but equally essential for it not to generate that content.
  • Google has successfully used Reinforcement Learning to design the layout for the next generation TPU chip. The layout process took 6 hours, and replaced weeks of human effort. This is an important breakthrough in the design of custom integrated circuits.
  • Facebook has developed technology to identify the source from which deepfake images originate. “Fingerprints” (distortions in the image) make it possible to identify the model that generated the images, and possibly to track down the creators.
  • Adaptive mood control is a technique that autonomous vehicles can use to detect passengers’ emotions and drive accordingly, making it easier for humans to trust the machine. We hope this doesn’t lead AVs to drive faster when the passenger is angry or frustrated.
  • IBM has developed Uncertainty Quantification 360, a set of open source tools for quantifying the uncertainty in AI systems. Understanding uncertainty is a big step towards building trustworthy AI and getting beyond the idea that the computer is always right. Trust requires understanding uncertainty.
  • Waymo’s autonomous trucks will begin carrying real cargo between Houston and Fort Worth, in a partnership with a major trucking company.
  • GPT-2 can predict brain activity and comprehension in fMRI studies of patients listening to stories, possibly indicating that in some way its processes correlate to brain function.
  • GPT-J is a language model with performance similar to GPT-3.  The code and weights are open source.
  • It appears possible to predict preferences directly from the brain, by comparing brain activity to activity of others (essentially, brain-based collaborative filtering). A tool for advertising or for self-knowledge?
  • Features stores are tools to automate building pipelines to deliver data for ML applications in production. Tecton, which originated with Uber’s Michelangelo, is one of the early commercial products available.
  • How does machine learning work with language? Everything You Ever Said doesn’t answer the question, but lets you play with an NLP engine by pasting in a text, then adding or subtracting concepts to see how the text is transformed.  (Based on GLoVE, a pre-GPT model.)
  • The HateCheck dataset tests the ability of AI applications to detect hate speech correctly. Hate speech is a hard problem; being too strict causes systems to reject content that shouldn’t be classified as hate speech, while being too lax allows hate speech through.


  • Twitter has built a data ethics group aimed at putting ethics into practice, in addition to research.  Among others, the group includes Rumman Chowdhury and Kristian Lum.
  • A study of the effect of noise on fairness in lending shows that insufficient (hence noisier) data is as big a problem as biased data. Poor people have less credit history, which means that their credit scores are often inaccurate. Correcting problems arising from noise is much more difficult than dealing with problems of bias.
  • Andrew Ng’s newsletter, The Batch, reports on a survey of executives that most companies are not practicing “responsible AI,” or even understand the issues. There is no consensus about the importance (or even the meaning) of “ethics” for AI.
  • Using AI to screen resumes is a problem in itself, but AI doing the interview? That’s taking problematic to a new level. It can be argued that AI, when done properly, is less subject to bias than a human interviewer, but we suspect that AI interviewers present more problems than solutions.


  • WebGPU is a proposal for a standard API that makes GPUs directly accessible to web pages for rendering and computation.
  • An end to providing cookie consent for every site you visit?  The proposed ADPC (advanced data protection control) standard will allow users to specify privacy preferences once.
  • Using social media community guidelines as a political weapon: the Atajurt Kazakh Human Rights channel, which publishes testimonies from people imprisoned in China’s internment camps, has been taken down repeatedly as a result of coordinated campaigns.


  • Microsoft is working on eliminating passwords! Other companies should take the hint. Microsoft is stressing biometrics (which have their own problems) and multi-factor authentication.
  • Supply chain security is very problematic.  Microsoft admits to an error in which they mistakenly signed a device driver that was actually a rootkit, causing security software to ignore it. The malware somehow slipped through Microsoft’s signing process.
  • Markpainting is a technology for defeating attempts to create a fake image by adding elements to the picture that aren’t visible, but that will become visible when the image is modified (for example, to eliminate a watermark).
  • Amazon Sidewalk lets Amazon devices connect to other open WiFi nets to extend their range and tap others’ internet connections. Sidewalk is a cool take on decentralized networking. It is also a Very Bad Idea.
  • Authentication using gestures, hand shapes, and geometric deep learning? I’m not convinced, but this could be a viable alternative to passwords and crude biometrics. It would have to work for people of all skin colors, and that has consistently been a problem for vision-based products.
  • According to Google, Rowhammer attacks are gaining momentum–and will certainly gain even more momentum as feature sizes in memory chips get smaller. Rowhammer attacks repeatedly access a single row in a memory chip, hoping to corrupt adjacent bits.
  • While details are sketchy, the FBI was able to recover the BTC Colonial Pipeline paid to Darkside to restore systems after their ransomware attack. The FBI has been careful to say that they can’t promise recovering payments in other cases. Whether this recovery reflects poor opsec on the part of the criminals, or that Bitcoin is more easily de-anonymized than most people think, it’s clear that secrecy and privacy are relative.

Design and User Experience

  • Communal Computing is about designing devices that are inherently shared: home assistants, home automation, and more. The “single account/user” model doesn’t work.
  • A microphone that only “hears” frequencies above the human hearing range can be used to detect human activities (for example, in a smart home device) without recording speech.
  • Digital Twins in aerospace at scale: One problem with the adoption of digital twins is that the twin is very specific to a single device. This research shows that it’s possible to model real-world objects in ways that can be reused across collections of objects and different applications.


  • The Open Insulin Foundation is dedicated to creating the tools necessary to produce insulin at scale. This is the next step in a long-term project by Anthony DiFranco and others to challenge the pharma company’s monopoly on insulin production, and create products at a small fraction of the price.
  • Where’s the work on antivirals and other treatments for COVID-19? The answer is simple: Vaccines are very profitable. Antivirals aren’t. This is a huge, institutional problem in the pharmaceutical industry.
  • The National Covid Cohort Collaborative (N3C) is a nationwide database of anonymized medical records of COVID patients. What’s significant isn’t COVID, but that N3C is a single database, built to comply with privacy laws, that’s auditable, and that’s open for any group to make research proposals.
  • Can medical trials be sped up by re-using control data (data from patients who were in the control group) from previous trials? Particularly for rare and life-threatening diseases, getting trial volunteers is difficult because nobody wants to be assigned to the control group.
  • A remote monitoring patch for COVID patients uses AI to understand changes in the patient’s vital signs, allowing medical staff to intervene immediately if a patient’s condition worsens. Unlike most such devices, it was trained primarily on Black and Hispanic patients.
  • Machine learning in medicine is undergoing a credibility crisis: poor data sets with limited diversity lead to poor results.


  • Microsoft, OpenAI, and GitHub have announced a new service called Copilot that uses AI to make suggestions to programmers as they are writing code (currently in “technical preview”).  It is truly a cybernetic pair programmer.
  • Windows 11 will run Android apps. If nothing else, this is a surprise. Android apps will be provided via the Amazon store, not Google Play.
  • Microsoft’s PowerFx is a low-code programming language based on Excel formulas (which now include lambdas).  Input and output are through what looks like a web page. What does it mean to strip Excel from its 2D grid? Is this a step forward or backward for low code computing?
  • Open Source Insights is a Google project for investigating the dependency chain of any open source project. Its ability currently is limited to a few major packaging systems (including npm, Cargo, and maven), but it will be expanded.
  • Quantum computing’s first application will be in researching quantum mechanics: understanding the chemistry of batteries, drugs, and materials. In these applications, noise is an asset, not a problem.

Source link

British Airways Settles With 2018 Data Breach Victims
British Airways Settles With 2018 Data Breach Victims

British Airways has settled a case brought by customers and staff affected by a massive 2018 data breach that led to personal information being leaked, the court-appointed lead solicitors in the case said on Tuesday.

Law firm PGMBM said those affected by the data leak would receive a confidential settlement following mediation with British Airways. The resolution does not include any admission of liability by the airline, it added.

British Airways, owned by IAG, revealed a breach of its security systems in 2018 that caused the personal data of 420,000 staff and customers to be leaked.

British Airways in an emailed statement said it was pleased it has been able to settle the group action.

Britain’s Information Commissioner’s Office in October fined British Airways GBP 20 million (roughly Rs. 210 crores) – the data protection watchdog’s biggest such penalty at the time – for failing to protect the personal and financial details of its customers.

IAG shares were up 3 percent by 08:20 GMT (1:50pm IST) on the London Stock Exchange.

© Thomson Reuters 2021

For the latest tech news and reviews, follow Gadgets 360 on Twitter, Facebook, and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel.

British Airways Settles With 2018 Data Breach Victims

Samsung Galaxy S22 Ultra Tipped to Come With Third-Generation 108-Megapixel Rear Camera

Related Stories

Source link

Open-Source Intelligence (OSINT) Use by Governments
Open-Source Intelligence (OSINT) Use by Governments


Effect Group - Sam Tilston Hacker Noon profile picture

@effectgroupEffect Group – Sam Tilston

Bringing the power of open source research to the masses.

Open-Source Intelligence (OSINT) has become increasingly popular over recent years. OSINT provides value to growing corporations and government agencies alike.

In 2020, the market size of open-source intelligence (OSINT) exceeded USD $5 billion. The growth is due to escalated demand for data from publicly available sources.

OSINT is often considered alongside private businesses that are driving growth. However, the information is also used by government agencies for several reasons. Uses include cybersecurity and managing misinformation.

In the 1980s, the US military first coined the term ‘OSINT’. Since then, the dynamic reform of intelligence has been beneficial in many different scenarios.

What is OSINT?

The term open-source intelligence, commonly known as OSINT, refers to the process of legally collecting information that can be accessed and gathered from free, public sources online.

The process of gathering information includes various techniques. These include data mining, different crawling techniques, data extraction, data washing, and analysis.

In this instance, open source refers to the public and accessible nature of analysing data. It’s not to be confused with open-source software which includes OSINT tools.

OSINT operations have countless benefits. During a time where data is king and cybercrime continues rising, these benefits are especially useful.

The benefits have inspired both IT security professionals and state-sanctioned intelligence operatives to use various OSINT technologies.

History of OSINT

The earliest references of OSINT can be found in the creation of the Foreign Broadcast Monitoring Service (FBMS) in 1941. The agency had the important task of monitoring foreign broadcasts for any suspect action.

The term OSINT was first used in the late 1980s by the US military. It described the dynamic nature of information sources to find tactical success on the battlefield.

By 2004, the United States had experienced the horror of the September 11 attacks.  The government commissioned an open-source intelligence agency in response. This development would inspire future OSINT use in both government and private spaces.

Today, open-source intelligence is available in six main categories;

Media such as magazines, radio and television

  1. Internet such as online publications, social media and discussion groups
  2. Public government data such as reports, budgets, and hearings
  3. Professional and academic publications such as journals and academic papers
  4. Commercial data such as commercial imagery and databases
  5. Grey literature such as technical reports and patents

How Does OSINT Work?

In January 2021, there were an estimated 4.66 billion active internet users across the globe. A large percentage of these users have online accounts and submit information online.

Monitoring all this information manually is not only time-consuming but also near-impossible. The framework of OSINT processes and tools works to gather and collect data through various methods.

These methods include data mining, various crawling techniques, and data extraction.

Leveraging the benefits of OSINT allows a cyber-security team to achieve the following;

  1. Identify public-facing assets that could be vulnerable
  2. Learn about relevant information beyond the organisation’s immediate access
  3. Take action based on information attained
  4. Reduce security risks by identifying vulnerabilities
  5. Deal with crises and misinformation

While OSINT has developed to serve private and corporate purposes, its use in government organisations is also prolific.

Popular OSINT Technologies and Uses

In the current business landscape, OSINT technologies have the power to impact the business environment. Organisations are encouraged to be open and transparent about their goods and services.

There are several OSINT technologies that make access to data easy and convenient.

Here are a few examples of the various technologies available. Note the value that they offer in the private space.

  • Maltego – graphical link analysis tool that outlines various online relationships
  • Shodan – a search engine for internet-connected devices
  • theHarvester – a tool used to get email and domain-related information outside of an organisation
  • Check usernames – a tool to search for particular usernames or domains
  • Tineye – a tool used to identify whether an image is freely available online

As you can see, entities use OSINT tools for a range of activities, helping a wide range of industries. One group of operatives that benefit greatly from OSINT are government agencies.

Ways that Governments Can Apply Open Source Intelligence

The government has the critical role of protecting a nation. Various departments work to protect citizens and national assets.

With the rapid development of technology and the interconnectedness of online resources, the internet offers many uses. It also introduces the risk of cyber threats and vulnerabilities to infrastructure.

Making use of OSINT offers many benefits for governments (and government agencies), such as the following.


The threat of terrorism can be both domestic and international, stemming from both large and small groups.

Online spaces and social media platforms offer a platform for extremist movements. Often, these groups communicate and spread hateful messages online.

Consider how excitement was generated for the attack on the Capitol building in January 2021.

Regulating networks with various OSINT tools can flag these concerns. They can also offer a better understanding of how these groups work and the risk that they present.

Directing Misinformation

It’s not only physical attacks that present a threat to the nation. Modern technology and the viral spread of information makes it easy to produce online propaganda. Online platforms often feed citizens misinformation (or disinformation).

Misinformation can present itself in several ways. For example, impersonation, spreading fake news, reposting illegitimate information and sharing misleading information.

Being alerted to misinformation allows government security agencies to deal with the problem swiftly. As well as counter the misinformation with the truth.

Consider how misinformation spread about COVID-19 and how it affected public opinion. Election teams were able to address this information and build support.

National Cybersecurity

Hackers can work as solo criminals or in groups. Regardless of the setup, hackers present a financial and political threat. Governments use OSINT tools to detect agile cyber-attacks on data, infrastructure, and citizens.

Government intelligence agencies use OSINT technology in conjunction with other cybersecurity feeds. The systems protect against breaches and cyber espionage, network attacks and take-downs, and botnets.

These resources were particularly useful following the months of the pandemic. During this time, the number of malicious attacks and misinformation increased.

Transportation Security

Transportation hubs, such as airports, seaports and highways are the gateway for tourism and business. When compromised, the infrastructure becomes vulnerable. In turn, this puts added pressure on security teams protecting assets, data and human life.

Government intelligence teams working security in transportation use OSINT. Using open-source intelligence, it’s possible to secure and plan an incident response.

Accessing public information can help to warn against threats near transportation hubs. As well as stay alert to vulnerable data.

Dealing with National Crises

National (and global) disasters happen in a variety of ways. Intelligence teams need data to combat the likes of natural disasters, terrorist attacks, and public health crises.

Online spaces that offer knowledge can highlight hotspots of a crisis. The knowledge also offers the location of resources and how other destinations are responding to the same situation.

Open Source Intelligence Used by Governments

Governments (and government agencies) rely on OSINT for various purposes.

For example, OSINT plays a pivotal role in;

  • National security
  • Counterterrorism
  • Cyber tracking terrorists
  • Supplying policymakers with necessary information
  • …And more

Although the information is available in the public domain, government agencies have certain restrictions on the way that OSINT tools are used in relation to sensitivity and legal protocol.

There are several different government agencies leveraging OSINT around the world.

Here are a few examples of theory in practice.

US Homeland Security

America’s Department of Homeland Security has an open-source intelligence unit. In 2007, the Domestic Open Source Enterprise was established to support the department’s needs for information. Open sources are used to develop homeland security intelligence.

US Armed Forces

OSINT has assisted various departments of the United States’s armed forces with strategic communication and the management of hostile threats. These military offices include the likes of the National Geospatial-Intelligence Agency and the Defense Intelligence Agency.

UK Law Enforcement

UK law enforcement is another government sector that uses OSINT to protect the public and do their work effectively. For example, the metropolitan police use open source intelligence, such as social media, as an investigative tool.

UK Intelligence Corps

The British Intelligence Corp uses open-source intelligence to react quickly to incidents. As well as work together with other military groups and various government departments.  The organisation handles gathering information and using intelligent analysis techniques. OSINT helps this process.

Open Source Center (OSC)

The OSC has its headquarters in the Central Intelligence Agency (CIA). It involves a global network of multilingual analysts. The network works for the US government and handles various pieces of information. For example, military and local law enforcement issues found in the public space.

OSINT Continues to Offer Value

Open-source intelligence plays a crucial role in the daily happenings of various government organisations. The value offered by OSINT is forecasted to continually rise.

There’s no denying the benefits that OSINT offers in exposing national security threats and vulnerabilities. As online data continues to be exponentially available, so will the role of OSINT technologies continue to be used.

Effect Group - Sam Tilston Hacker Noon profile picture


Join Hacker Noon