Author: ProHoster

Reflections on the national NB-Fi standard and billing systems

Briefly about the main thing In 2017, a note appeared on Habré: “A draft national NB-FI standard for the Internet of Things was submitted to Rosstandart.” In 2018, the technical committee “Cyber-physical systems” worked on three IoT projects: GOST R “Information technologies. Internet of things. Terms and definitions", GOST R "Information technologies. Internet of things. Reference architecture for the Internet of Things and the Industrial Internet of Things,” […]

Entropy protocol. Part 3 of 6. The city that doesn't exist

There the hearth burns for me, Like an eternal sign of forgotten truths, It’s the last step for me to reach it, And this step is longer than life... Igor Kornelyuk Night walk Some time later, I followed Nastya along the rocky beach. Fortunately, she was already wearing a dress and I regained my ability to think analytically. It’s strange, I just broke up with Sveta, [...]

Private Pilot Training in Middle-earth: Moving and Living in a New Zealand Village

Hi all! I would like to share a rather unusual experience and complement bvitaliyg’s wonderful article on how to take to the skies and become a pilot. I'll tell you about how I went to a New Zealand village near Hobbiton to take the helm and learn to fly. How it all started I’m 25, I’ve worked in the IT industry my entire adult life and have not […]

Riseup Announces New VPN Service Based on Bitmask

Riseup has launched a new and easy-to-use VPN service - no configuration required, no registration, no SMS required. Riseup is one of the oldest non-profit organizations that develops and offers users services for safe and private browsing on the Internet. The service is based on Bitmask, which was previously created as part of the LEAP encryption access project. The purpose of creating Bitmask is […]

Release of JPype 0.7, libraries for accessing Java classes from Python

More than four years after the formation of the last significant branch, the release of the JPype 0.7 layer is available, which allows Python applications to have full access to class libraries in the Java language. With JPype from Python, you can use Java-specific libraries to create hybrid applications that combine Java and Python code. The project code is distributed under the Apache 2.0 license. In contrast […]

Xiaomi has sold more than 1 million Mi Band 4 fitness bracelets in eight days

Earlier this month, Xiaomi introduced the Mi Band 4 fitness bracelet, which received a color display, a built-in NFC chip and a heart rate sensor. The fitness bracelet made a good impression on potential buyers, which led to the sale of more than 1 million units of the gadget in the first eight days from the start of official sales. It is noteworthy that the device is currently only available in the Chinese market, […]

PC case SilverStone RL08: metal and tempered glass

SilverStone has announced the RL08 computer case, suitable for creating a gaming desktop system with a spectacular appearance. The new product is made of steel, and the right side wall is made of tempered glass. There are two versions available: black with red left side and black with white left side. Installation of Micro-ATX, Mini-DTX and Mini-ITX motherboards is allowed. Inside there is space for [...]

The Salmon Project: How to Effectively Counter Internet Censorship Using Proxies with User Trust Levels

The governments of many countries in one way or another restrict citizens' access to information and services on the Internet. Fighting such censorship is an important and difficult task. Usually simple solutions cannot boast of high reliability or long-term efficiency. More complex lock traversal methods have downsides in terms of usability, slow performance, or fail to maintain […]

Reversing and hacking Aigo self-encrypting external HDD. Part 2: Dumping the Cypress PSoC

This is the second and final part of the article about hacking external self-encrypting drives. I remind you that a colleague recently brought me a Patriot (Aigo) SK8671 hard drive, and I decided to reverse it, and now I'm sharing what happened. Before reading further, be sure to read the first part of the article. 4. We begin to dump from the internal PSoC flash drive 5. ISSP protocol - […]

Failover Cluster PostgreSQL + Patroni. Implementation experience

In the article I will tell you how we approached the issue of PostgreSQL fault tolerance, why it became important for us and what happened in the end. We have a highly loaded service: 2,5 million users worldwide, 50K+ active users every day. The servers are located in Amazone in one region of Ireland: 100+ different servers are constantly working, of which almost 50 […]

The authors of Layers of Fear are working on a secret project along with Blair Witch

Eurogamer interviewed developer Maciej Głomb and screenwriter Basia Kciuk from Bloober Team. Representatives of the Polish studio talked mostly about the creation of Blair Witch, announced at E3 2019, but they also let slip about a new secret project. The authors reported the following: “After the production of Observer, the team split into three internal teams. One started […]

Google in Russia faces a fine of up to 700 thousand rubles

It is possible that a large fine will be imposed on Google in our country for failure to comply with the law. This, as reported by TASS, was stated by Alexander Zharov, head of the Federal Service for Supervision of Communications, Information Technologies and Mass Communications (Roskomnadzor). We are talking about compliance with requirements regarding filtering of prohibited content. In accordance with current legislation, search engine operators are obliged […]