China Moves Fast Into The Future With Self-Driving Buses In Shenzhen.

A few days ago, a taxi man engaged me in a conversation.  He asked if I was ubering someone because he saw me was waiting near his spot.  I told him I was not and was only waiting for a friend.  The conversation carried on to the point in which he confessed Uber has taken away too many customers from him.  He told me once he was making something like thousands of dollars in a week, but now this is pretty much gone.

I didn’t want to make him feel worse, and so I kept my mouth shut about automation.  Basically, China is heading this way.  More self-driving buses are now out and about in Shenzhen, China.  Check out the video on this right after the break.

I think even whoever relies on Uber for driving customers around will eventually lose out to self-driving Uber cars.  In fact, I can even imagine up some self-driving car services such as self-driving taxi cabs will be able to mimic a human touch by installing smart, sexy robots that can pretend to drive but could carry on a real conversation with the human customers.

I think the future is all about automation.  I think this trend will speed up fast.  I think people will lose jobs to automation for sure.

Advertisements

Root Security Flaw Allows Anyone To Become Root In Mac OS High Sierra

I can confirm the new root security flaw would affect the Apple’s MacBook Pro 2016 model because I’m using one at the moment.  I can also confirm this same flaw would also work on my older MacBook Pro (Mid 2010 model).  Basically, as of how other people have mentioned, this flaw would work regardlessly the MacBook laptop model you’re using as long you had upgraded your MacBook machine to Mac OS High Sierra.  As of now, the flaw is also affecting the latest version of Mac SO High Sierra (10.13.1).  How would the flaw work?  Read on…

I assume this flaw would work still even you have turned on FileVault.  Basically, as long your Mac allow anybody to enter the username as root at the login screen or any login prompt (except in terminal), he/she could just hit enter once or twice without using any password and the root login would be successful.  If you’re new to Mac and Linux, let’s just say that root is the super account that can do just about anything on Mac and Linux machines.  Root can change all users’ passwords.  In fact, root can even erase the entire machine’s storage and destroy the whole operating system with just one command which is [rm -rf /].

I tested the flaw out as how I’d seen on YouTube, and it worked marvelously.  Basically, I was already logged into the machine, and so I went to System Preferences > Users & Groups > clicked the lock icon at the bottom left > entered root at the username prompt > hit “enter key” twice and became root right after.  From here I could change any user’s password or delete any user and group.  In fact, any login prompt would allow me to become root and execute the available super account’s features.

To fix this problem, as seen on YouTube, I opened up the terminal > typed in the command [sudo su] > entered root password (hit enter key without password won’t work in terminal) > typed in command [passwd] > entered same root password or new one (doesn’t matter as long you type in a password you could remember) > exit the terminal entirely by typed [exit] couple times in the terminal > shutdown the terminal by quitting the terminal from the dock.  After this, I tried the root flaw and it wouldn’t work on the graphical user interface such as in the System Preferences.  Thus, I think the fix is real.

Here is one secret I would let you guys in.  Actually, this flaw isn’t a flaw.  Apple has always been easy in regarding in allowing people to physically reset a user password.  In fact, you can also reset a root password of your Mac for as long as Mac has been in the existence, because in the video right after the break I’d talked about how to reset an administrator password in Mac OS X Lion without remembering the root password or using a recovery disk.  By the way, Mac OS X Lion is way back then.  I think Mac OS X Lion was released in 2011.

Since 2011-2012, I haven’t tested the trick I talked about in the video, and so I’m very rusty now.  I’m not even sure the same trick would work exactly the same way as how I had walked you through in the video for newer machines and newer Mac OS iterations.  Regardless, I think even now there should be some similar tricks for you to reset an administrator/root password on any Mac OS as long you got a physical access to the machine.  Maybe FileVault would be able to stop and block the trick I’d shown you in the video from working successfully, but I’m not sure if this is even the case since I haven’t tested this very trick out when I got FileVault running.  So, I think the best security is still all about keeping your machine in a locked cage when you’re not around it.  Keeping a physical machine away from unwanted intruders/hackers would be the best way to stop easy hacks.  Regardless, sometimes remote hacks could also be as easy as the root flaw I’d mentioned in this post.

I Like It, But I Want Better Amazon Key Kit

I like the Amazon key idea, but the kit is kind of expensive for me at the moment.  Why?  Just only for one front door and it’s $249.99.  Although I understand why it’s cost so much because the installation is going to be free and you get a camera with the package.  The camera would allow the recording sessions to be automated whenever a delivery is made by Amazon’s delivery guys.  I’m not sure if the camera recording session would also activate whenever someone opens the door when you’re not home because this would also be cool.  I think Amazon needs to up the ante by allowing the Amazon key kit to cover both back and front doors before I think it’s a good deal.  Also, I hope that Amazon key kit could be connected to home alarm system if you already got one.  That would be really convenient because you can then deactivate your alarm system from afar (i.e., remotely done).

Oh, by the way, the Amazon Key cameras should also allow you to shut them down for good unless you need them to be turned on.  This way you won’t have to worry about Amazon is monitoring you at home.  I think many people are paranoid when it comes to being monitored by a corporation, business, government, and whatnot through a remote camera.  So, Amazon, you need to provide a way for people to control the cameras from monitoring them.  Furthermore, what will happen if a hacker is able to take over Amazon key cameras?  The answer should be obviously bad!