Four short links: 28 Oct 2020

Split-Second Phantom Attacks, Deep Fakery, Serverless, and RE McDonalds API

By Nat Torkington
October 28, 2020
Four Short Links
  1. Phantom of the ADASIn this paper, we investigate “split-second phantom attacks,” a scientific gap that causes two commercial advanced driver-assistance systems (ADASs), Telsa Model X (HW 2.5 and HW 3) and Mobileye 630, to treat a depthless object that appears for a few milliseconds as a real obstacle/object. Turns out neural networks can have subliminal message problems. (via Gradient Flow)
  2. Photoshop Adds Deep Fakery — Everyone’s going to be doing it. Photoshop adds controls to let you change facial expressions in a photo, among other things. Digital images weren’t real, but somehow they feel less real now.
  3. Learn faster. Dig deeper. See farther.

    Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.

    Learn more
  4. Serverless & Distributed Systems Productivity1. Prefer running your system in the cloud over local emulation. 2. CI/CD Pipelines are not enough, local deployment automation is crucial. 3. For AWS Serverless & “Function-as-a-Service” – monolithic functions are OK. 4. Consider adopting a monorepo, with tooling appropriate for monorepos. 5. Implement all three pillars of observability.
  5. Reverse-Engineering McDonalds’ Internal APII reverse engineered mcdonald’s internal api and I’m currently placing an order worth $18,752 every minute at every mcdonald’s in the US to figure out which locations have a broken ice cream machine.
Post topics: Four Short Links
Post tags: Signals