Think or not industry weekly GitHub buries the code to the North Pole! Independent industrial real-time operating system Necro qiuniu released! Mobile phone SDK plug-ins steal user privacy

Time:2020-8-23

GitHub’s move to the North Pole excited developers, but a large number of developers expressed concern that their “water injected code” would be ridiculed by later generations. The release of Necro qiuniu, an independent industrial real-time operating system, has brought China’s industrial control, traffic management, robotics, aerospace, weapons and equipment into a more secure state. Cloudflare DNS service has been interrupted, a large number of websites and services can not be accessed, and even affected the players of the League of heroes.

(PS: click the pictures in the article to view the corresponding complete news)

Editor on duty: zongen
Think or not industry weekly GitHub buries the code to the North Pole! Independent industrial real-time operating system Necro qiuniu released! Mobile phone SDK plug-ins steal user privacy

1.GitHub buried the code in the North Pole! The first batch of open source projects have been deposited in the permafrost 250 meters underground

Think or not industry weekly GitHub buries the code to the North Pole! Independent industrial real-time operating system Necro qiuniu released! Mobile phone SDK plug-ins steal user privacy

“Keep open source code in the Arctic for 1000 years!” Last year, GitHub announced a code archiving program, Arctic code vault, to bury the code in the Arctic permafrost 250 meters deep, hoping to preserve the code for 1000 years.

Now, it’s not just a distant dream. GitHub has saved the active public repository snapshot to the data warehouse in the Arctic for future use. In addition, GitHub has designed commemorative badges for developers in their profiles.

Comments from netizens:

@Mouse: what should I do if my bug is discovered by archaeology

@Pozzolanic ash: just the garbage that I wrote, put it into the Antarctic polluted environment?

@Xiaoguang: we also agreed to bury 996, ICU

2.Independent industrial real-time operating system Necro qiuniu released! It can be fully compatible with POSIX standard, ms level control cycle and US level time jitter

Think or not industry weekly GitHub buries the code to the North Pole! Independent industrial real-time operating system Necro qiuniu released! Mobile phone SDK plug-ins steal user privacy

Recently, guoxinxin micro released its independent industrial real-time operating system Necro qiuniu.

The real-time operating system is unfamiliar to the public. We are exposed to windows, IOS, Android and Linux All of them are time-sharing operating systems, while real-time operating systems are used in industrial control, traffic management, robotics, aerospace, weapon equipment and other fields, because if the response of system events cannot be on time or overtime, it may lead to huge losses and disasters.

Comments from netizens:

@Beep boy: where can I download it??


3. Cloudflare DNS service is interrupted and a large number of websites and services cannot be accessed

Think or not industry weekly GitHub buries the code to the North Pole! Independent industrial real-time operating system Necro qiuniu released! Mobile phone SDK plug-ins steal user privacy

It was reported on July 18 that cloudflare DNS service was interrupted and a large number of websites and services could not be accessed. It is reported that the services affected include: authy, digital ocean, discord, downdetector, gitlab, medium, patron and riot, etc. in addition, the League of heroes has also been affected by the association, which also makes this event more widely spread.

Comments from netizens:

@8.8.8.8: I hope this will not happen again


4. Mobile SDK plug-ins steal users’ privacy. Do you get caught?

Think or not industry weekly GitHub buries the code to the North Pole! Independent industrial real-time operating system Necro qiuniu released! Mobile phone SDK plug-ins steal user privacy

Recently, at the 315 party, CCTV exposed Shanghai krypton information technology and Beijing Zhaocai Wangwang Information Technology Co., Ltd. they secretly steal users’ privacy, IMEI, IMSI, operator information, phone number and SMS records of their devices by embedding SDK plug-ins into more than 50 mobile phone apps , address book, application installation list and sensor information have become the target of theft.

In April 2019, Nandu personal information protection research center commissioned China Financial Certification Center to make a privacy data analysis report on the SDK with high utilization rate. The report shows that among the 60 commonly used application software evaluated, at least 966 SDKs were used, with an average of 19.3 SDKs for each app. That is to say, it is almost impossible for users not to contact the SDK.

Comments from netizens:

@Let yourself go: Oh, I see. Is this abnormal

@The pot and dish meeting: so it’s the big factories that caused the trouble


-END-

Think or not industry weekly GitHub buries the code to the North Pole! Independent industrial real-time operating system Necro qiuniu released! Mobile phone SDK plug-ins steal user privacy

Recommended Today

Implementation example of go operation etcd

etcdIt is an open-source, distributed key value pair data storage system, which provides shared configuration, service registration and discovery. This paper mainly introduces the installation and use of etcd. Etcdetcd introduction etcdIt is an open source and highly available distributed key value storage system developed with go language, which can be used to configure sharing […]