BeNN
1.1K subscribers
915 photos
82 videos
115 files
154 links
From simple ML algorithms to Neural Networks and Transformers — and from Number Theory to Topology, Cosmology to QED — dive into the world where code meets the cosmos.👨‍💻🌌

For Any Questions @benasphy
Download Telegram
The explosion of NASA's Challenger Space Shuttle only 73 seconds after it launched in 1986 is one of the U.S. space agency's worst-ever disasters, resulting in the loss of life of all seven crew members onboard, including a schoolteacher taking part in a new NASA initiative.

Find out more at https://ie.social/4xbQV 🚀
A robot at Gloucestershire Royal Hospital (GRH), United Kingdom, saved the life of a 61-year-old patient by removing a cancerous tumor from their throat, in what can be called a first in the country.

Grandfather Martin Nugent is in high spirits after a surgical team comprising Gloucestershire Royal Hospital surgeons Simon Higgs and Steve Hornby employed Versius, a modern, cutting-edge robot from CMR Surgical, to operate earlier in July.

Find out more at https://ie.social/V9MxV 🚀
🤯2
Paleontologists have uncovered the first known incident of a mammal being eaten by a dinosaur.

Hold your horses. Scientists have confirmed that the mammal would not have been a human ancestor.

Find out more at https://ie.social/4aE64 🚀
👍1😱1
Colonizing space will undoubtedly be one of humanity's most important future achievements. Establishing a colony in space is a big part of the work of the world's leading technology giants. But colonizing space isn't just for big tech giants, of course.

Engineers at the University of California, Irvine said microbes could help colonize the Moon and Mars.

Find out more at https://ie.social/4LmBe 🚀
👍1
The National Institute of Standards and Technology researchers have developed a deep learning algorithm called BreatheSmart that can monitor your breathing based on minuscule changes in Wi-Fi signals.

Prior research has already looked into using Wi-Fi signals to sense people or movement, but they required custom sensing devices, and data from those studies were limited.

Find out more at https://ie.social/V01QN 🚀
1👍1
Do u wanna get Netflix account and telegram premium for free from bot?
Anonymous Poll
82%
Yeah
18%
Nope
​​👹 MAN IN THE MIDDLE ATTACK

Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website.

Attackers have many different reasons and methods for using a MITM attack. Typically, they’re trying to steal something, like credit card numbers or user login credentials. Sometimes they’re snooping on private conversations, which might include trade secrets or other valuable information

😉Usefull Types of Man-in-the Middle Attacks

Wi-Fi Eavesdropping

If you’ve ever used a laptop in a coffee shop, you may have noticed a pop-up that says “This network is not secure.” Public wi-fi is usually provided “as-is,” with no guarantees over the quality of service.

However, unencrypted wi-fi connections are easy to eavesdrop. It’s much like having a conversation in a public restaurant – anyone can listen in

Another Wi-Fi Eavesdropping attack happens when a hacker creates its own wi-fi hotspot, called an “Evil Twin.” They make the connection look just like the authentic one, down to the network ID and passwords. Users may accidentally (or automatically) connect to the “evil twin,” allowing the hacker to snoop on their activity.


Email Hijacking

In this type of cyber security attack, a hacker compromises a user’s email account. Often, the hacker silently waits, gathering information and eavesdropping on the email conversations. Hackers may have a search script that looks for specific keywords, like “bank” or “secret Democrat strategies.”

Email hijacking works well with social engineering. Hackers might use information from a hacked email account to impersonate an online friend. They may also use spear-phishing to manipulate a user to install malicious software.


Session Hijacking

This type of Man-in-the attack is typically used to compromise social media accounts. With most social media sites, the website stores a “session browser cookie” on the user’s machine. This cookie is invalidated when the user logs off. But while the session is active, the cookie provides identity, access, and tracking information.

A Session Hijack occurs when an attacker steals a session cookie. This can happen if the user’s machine is infected with malware or browser hijackers. It can also happen when an attacker uses a cross-scripting XSS attack – where the attacker injects malicious code into a frequently-used website.
👍1
Have you heard of the mysterious hacking group known only as Anonymous? Behind their trademark Guy Fawkes masks lurks a global collective of cyber-vigilantes who hijack computer systems in pursuit of their own brand of justice.

Anonymous first caught the public's attention by taking down the Church of Scientology's websites after the church tried to censor an embarrassing video. But their technological prowess was only just beginning.

In 2011, Anonymous launched attacks on Middle Eastern governments to support Arab Spring protestors. Calling themselves "hacktivists," they disabled government websites and accessed sensitive documents to expose corruption. Authorities scrambled to stop their infiltration but with little success against these digital rebels!

Perhaps most brazen was Anonymous' revenge on the FBI for shutting down the dark web site Silk Road. Within days, Anonymous hackers seized control of FBI servers and released sensitive files revealing the irony of the FBI's own hacking programs! A bold attack on the world's top law enforcement agency.
While their methods are legally and ethically questionable, Anonymous continues to thrive. This decentralized collective has proven nearly impossible to stop, going wherever their unique code of online vigilantism takes them.

Does Anonymous' brand of rogue hacking do more good than harm? Or are they cyber-terrorists who should be stopped? What do you think? Share your thoughts below!
😱3👍2🔥1
🚀 Welcome to BeNN channel

Hey everyone! I’m rebooting this channel—not just as a place to post, but as a hub for deep, open discussions on everything that sparks curiosity. If you love exploring big ideas, pushing boundaries, and debating the unknown, you’re in the right place.

🔹 AI – From from Machine learning various models, Neural Nets to cutting-edge transformers, breaking down "Attention Is All You Need" and other groundbreaking papers. Siamese networks, reinforcement learning, AGI speculation—nothing’s off-limits.

🔹Programming – Python and its endless libraries, but also the forgotten legends like FORTRAN. Let’s talk about code, algorithms, and the beauty behind the logic.

🔹Physics – From the elegance of "Einstein’s General Relativity" to the enigma of Hawking’s Black Holes. Astrophysics, time dilation, the heat death of the universe—let’s question reality itself.

🔹Quantum Mechanics – Schrödinger’s cat, the Uncertainty Principle, quantum computing, and whether we really do live in a superposition of infinite possibilities.

🔹Mathematics – Number theory, calculus, Euler’s madness, Gauss’s elegance, Gödel’s incompleteness, and the unsolved mysteries that keep mathematicians awake at night.

🔹Movies & Series 🍿 – Breaking down cinematic masterpieces, Debating on GOAT series, other than Game of Thrones 😆 just raise your reason if you wanna say Breaking Bad😎.

🔹Life & Ideas – Philosophies, random musings, thought experiments—why do we exist, and what should we do about it?

This is a space for unfiltered discussion. No barriers, no limits—just raw curiosity and the freedom to think. Drop a message, challenge ideas, and let’s explore the unknown together. 🔥

#AI #MachineLearning #Physics #Quantum #Math #Programming #Movies #Ideas
👍5🔥3😱1
The Turing Test

Imagine you’re chatting with two mysterious entities—one is human, the other is a machine. You can ask anything: riddles, jokes, deep philosophical questions. If you can’t tell which one is human, does that mean the machine is thinking?

This is the essence of the Turing Test, a challenge proposed by Alan Turing, the father of modern computing.

Who Was Alan Turing?


Alan Turing wasn’t just another mathematician—he was a war hero, a codebreaker, and a visionary. During World War II, he cracked the Nazi Enigma code, saving millions of lives. But his mind didn’t stop at cryptography. He asked one of the most profound questions of all time:

"Can machines think?"

Since “thinking” is hard to define, Turing proposed a test in 1950. If a machine could convince a human that it was also human, then it should be considered intelligent.


How Does the Turing Test Work?
Picture this:

1. You’re the judge, sitting at a computer.

2. You’re chatting with two entities—one human, one AI.

3. Your job? Figure out which is which.

If the AI manages to fool you as often as a real human would, it passes the test. Simple, right?


Alan Turing’s idea sparked the AI revolution, but we’re still far from machines that truly think (maybe Not😁). Maybe one day, an AI won’t just pass the Turing Test—it will ask us its own questions.
4👍1🔥1🤔1
Forwarded from Artificial Intelligence (Artificial Intelligence)
CEOs in 2025: "AI will write 90% of the code...!"
CEOs in 2026: "AI will write 100% of the code..!!"
CEOs in 2027: 'Wait… why is nothing working?"

Devs in 2027: "AI is now writing only 10% of the code… and we're getting paid 2x more to clean up the mess it made. The circle of tech life continues!" 😆💸

AI writing code is cool… until you realize debugging AI’s “creativity” is way harder than writing code yourself. AI won’t replace Devs - it’ll just make them more necessary😆
👍7