Forwarded from martian
1. While quantum computers themselves are far more energy-efficient per calculation than classical supercomputers, the real concern is the massive power demand of their supporting infrastructure, especially cryogenic cooling. A single system can use dozens of kilowatts, and scaling up could strain power grids.
Current plans rely on renewable energy and strategic siting near low-carbon power sources to avoid repeating the "clean tech, dirty grid" mistake. Major companies and governments are already considering this, with some exploring small modular nuclear reactors for a steady, low-carbon supply. However, there is no guaranteed global standard yet, and without strict regulations and transparent reporting, there's a real risk of increased fossil fuel use to meet demand.
The potential exists for a net positive impact, but it depends entirely on enforcement of renewable energy commitments and improvements in hardware efficiency, not just optimistic projections.
Current plans rely on renewable energy and strategic siting near low-carbon power sources to avoid repeating the "clean tech, dirty grid" mistake. Major companies and governments are already considering this, with some exploring small modular nuclear reactors for a steady, low-carbon supply. However, there is no guaranteed global standard yet, and without strict regulations and transparent reporting, there's a real risk of increased fossil fuel use to meet demand.
The potential exists for a net positive impact, but it depends entirely on enforcement of renewable energy commitments and improvements in hardware efficiency, not just optimistic projections.
Forwarded from martian
Forwarded from martian
Media is too big
VIEW IN TELEGRAM
Forwarded from martian
This above is the current state of the change to be impelemented and imposed very soon.
Forwarded from martian
Forwarded from martian
This media is not supported in your browser
VIEW IN TELEGRAM
Who owns the data, owns the world
👨💻2
Forwarded from Fireworks Daily Team 2.0 (Pirate Ballz NotADude)
NEW - EU’s top executive body confirms a cyberattack after hackers reportedly stole 350GB of data from cloud storage.
Read here: https://www.disclose.tv/id/l8xd52o1go/
Read here: https://www.disclose.tv/id/l8xd52o1go/
Disclose.tv
European Commission confirms cyberattack after hackers claim data breach
Breaking news from around the world.
Forwarded from Fireworks Daily Team 2.0 (Remi)
NEW - China used fake LinkedIn profiles to spy on NATO, EU: security source
READ: https://t.co/WKxIopytHk
READ: https://t.co/WKxIopytHk
Insider Paper
China used fake LinkedIn profiles to spy on NATO, EU: security source
China used fake LinkedIn profiles in an attempt to harvest sensitive data from NATO and European Union institutions by soliciting information from staff,
Forwarded from Doomsday shortages
One AI data center needs ~50,000 tons of copper
• 527 new data centers are being built globally
• S&P Global sees a 10M ton supply gap by 2040
• New mines can take ~19 years to come online
• Ore grades have already dropped ~40% since 1991
Should see general uptrend in copper with a wave 3 peak at $8 per lb by 2028 or sooner.
• 527 new data centers are being built globally
• S&P Global sees a 10M ton supply gap by 2040
• New mines can take ~19 years to come online
• Ore grades have already dropped ~40% since 1991
Should see general uptrend in copper with a wave 3 peak at $8 per lb by 2028 or sooner.
Forwarded from martian
Over the course of next 10 years (2026-2036), AI will not replace human cybersecurity experts but will fundamentally transform their roles. The demand for human professionals will remain high due to an enduring talent shortage, with millions of positions unfilled globally (4.8 million cybersecurity jobs projected to remain unfilled in 2026; compared to 3.4 million in 2022; 4 million in 2023)
Forwarded from Azazel News
https://www.cnbc.com/amp/2026/01/15/-gene-yu-us-special-forces-cybersecurity-startup-blackpanda.html
CNBC
46-year-old former U.S. special forces officer is now a startup CEO—his cybersecurity company has raised $22 million
Former U.S. special forces officer Gene Yu is now the co-founder and CEO of cybersecurity startup Blackpanda. The company has raised about $22 million to date.
❤3
Forwarded from Azazel News (Tee⛳️)
This media is not supported in your browser
VIEW IN TELEGRAM
These are the 5 steps involved in OPSEC
1- Identify critical information
2- Analyze threats
3- Analyze vulnerabilities
4- Assess risks
5- Apply countermeasures
1- Identify critical information
2- Analyze threats
3- Analyze vulnerabilities
4- Assess risks
5- Apply countermeasures
Forwarded from martian
Forwarded from Thérèse
From the article, he is working for Asian companies rather than American.
Forwarded from Azazel News (Tee⛳️)
Step 1: Identify critical information: Understand what information is sensitive
The first step is to determine what data would be particularly harmful to the organization if an adversary obtained it.
This includes intellectual property, employees' or customers' personally identifiable information, financial statements, credit card data and product research.
Critical information is any information you have in your device that could be used against you, given you are toughened enough to keep those inside your head a secret even under torture or similar circumstances.
The first step is to determine what data would be particularly harmful to the organization if an adversary obtained it.
This includes intellectual property, employees' or customers' personally identifiable information, financial statements, credit card data and product research.
Critical information is any information you have in your device that could be used against you, given you are toughened enough to keep those inside your head a secret even under torture or similar circumstances.
Forwarded from Azazel News (Tee⛳️)
Step 2: Threat assessment: Identify potential cybersecurity threats.
The next step is to identify who is a threat to the organization's critical information.
There may be numerous adversaries who target different information, and companies must consider any competitors or hackers who might target the data.
The goal of threat analysis is to understand how adversaries could target an organization and use information to their advantage.
The threat analysis includes identifying potential adversaries and their associated capabilities and intentions to collect, analyze, and exploit critical information and indicators.
Organizations should seek support from their security, intelligence, and counterintelligence experts
The next step is to identify who is a threat to the organization's critical information.
There may be numerous adversaries who target different information, and companies must consider any competitors or hackers who might target the data.
The goal of threat analysis is to understand how adversaries could target an organization and use information to their advantage.
The threat analysis includes identifying potential adversaries and their associated capabilities and intentions to collect, analyze, and exploit critical information and indicators.
Organizations should seek support from their security, intelligence, and counterintelligence experts
Forwarded from Azazel News (Tee⛳️)
Step 3: Vulnerability analysis: Identify weaknesses in security
In this stage, the organization examines potential weaknesses among the safeguards in place to protect critical information and identifies which ones leave it vulnerable.
This step includes finding any potential lapses in physical and electronic processes designed to protect against the predetermined threats or areas where a lack of security awareness training leaves information open to attack.
To perform vulnerability analysis, an OPSEC analyst must consider the adversary's perspective and try to identify any susceptibilities that could be exploited.
This includes:
• The types of activities an adversary could observe
•The types of information an adversary could collect
•Organizational weaknesses that an adversary could exploit
•Potential gaps in physical or electronic processes
•Areas where a lack of security awareness training could leave information vulnerable
In this stage, the organization examines potential weaknesses among the safeguards in place to protect critical information and identifies which ones leave it vulnerable.
This step includes finding any potential lapses in physical and electronic processes designed to protect against the predetermined threats or areas where a lack of security awareness training leaves information open to attack.
To perform vulnerability analysis, an OPSEC analyst must consider the adversary's perspective and try to identify any susceptibilities that could be exploited.
This includes:
• The types of activities an adversary could observe
•The types of information an adversary could collect
•Organizational weaknesses that an adversary could exploit
•Potential gaps in physical or electronic processes
•Areas where a lack of security awareness training could leave information vulnerable