Crimson Reason

A site devoted mostly to everything related to Information Technology under the sun - among other things.

Tuesday, December 9, 2025

News of Self-driving Cars

Which goes to show that self-driving cars can be as stubborn and unreasonable as any (human) driver. 

If I understood correctly, it is a software problem. Cars - all of them - have become computers on 4 wheels: if one goes by the performance of the average PC running Windows, this is hardly reassuring ("Your car speaking! Good morning! Sorry but I need to shut down the engine for a short period of time to run a critical update. You might want to re-schedule your urgent hospital appointment as you are going to be late - approximately 20 minutes. Thank you! Have a nice day!"). 

https://youtube.com/shorts/oNVDL2kzCpM?si=cUDHI0seK9DweIZY

Monday, December 8, 2025

Pigeons Fitted with Neural Chips [Brave New World]

From METRO of the UK, November 28, 2025


How about fitting infantrymen with neural chips, to better steer them into battle and make sure they move forward, even when they are scared to death? As for the pigeons, the next step would be to turn them into flying suicide bombers... 

_____________________




Friday, December 5, 2025

Monday, December 1, 2025

Peeping-Tom Hackers in Korea

BBC

Those video-cameras, known as IP cameras or home cameras, are meant to protect the people on site and enhance their security but they are, really, a potential way to invade a person's privacy and compromise it in the worst possible way. In other words, those hi-tech tools are also - paradoxically and yet unsurprisingly - a major security risk. 

No surprises here; both Korea and Japan are major Peeping-Tom nations - the earlier perpetrators only had cameras and were taking pictures looking under the women's dresses and skirts.  This is a major quantitative escalation.

______________

Four people have been arrested in South Korea for allegedly hacking more than 120,000 video cameras in homes and businesses and using the footage to make sexually exploitative materials for an overseas website.
Police announced the arrests on Sunday, saying the accused exploited the Internet Protocol (IP) cameras' vulnerabilities, such as simple passwords.
A cheaper alternative to CCTV, IP cameras - otherwise known as home cameras - connect to a home internet network and are often installed for security or to monitor the safety of children and pets.
Locations of cameras hacked in the country reportedly included private homes, karaoke rooms, a pilates studio and a gynaecologist's clinic.

Sunday, November 30, 2025

Dial-a-Prophet

You can now text with Jesus. Really! Well, maybe not really-really: 

Text with Jesus” is an A.I.-powered chatbot smartphone app trained in biblical concepts, introduced to a divided America where 30 percent of the population now says they have no religious affiliation — a number that’s been steadily rising. 

Stéphane Peter, the French-born Los Angeles-based software engineer behind the company, admits he is “not particularly religious at the moment,” but says “it’s been incredible to see how many want to try a conversation with biblical figures.” 

Not just Jesus: all 12 apostles are in the app, among other biblical figures such as Moses; he hopes to have “The Three Wise Men” added before Christmas. Plus, NBC added, “Premium users can also converse with Satan.” 

(RC/AFP, WFLD Chicago, NBC) ...Users insist the connections are authentic because the bot never answers their actual questions.

Tuesday, November 25, 2025

Losing the Encrypted Key [Life in Tech]

From BBC


Doesn't look good: for example, if you are a fireman, and your house burns down... 

I know very little about such things, but I was wondering: was the 'encrypted key' literally a key - like the key to your front door? If so, it sounds pretty low tech, in a way ("Here's your key, Rupert. Don't lose it, or else we're in trouble"). 

Or was it some magic formula, and each of the 3 'trustees' was given 1/3 of the complete 'encrypted key', which sounds a bit like a second-rate science-fiction movie. There must be the temptation to scribble it down on a piece of paper, which makes it sound a bit Harry Potterish. Then again, you shouldn't lose the scrap of paper, then ("I've lost the encrypted key! I've lost the encrypted key! I left it on the train! On the train!"). 

___________

A firm considered one of the leading global voices in encryption has cancelled the announcement of its leadership election results after an official lost the encrypted key needed to unlock them.
The International Association for Cryptologic Research (IACR), external uses an electronic voting system which needs three members, each with part of an encrypted key, to access the results.
In a statement,, external the scientific organisation said one of the trustees had lost their key in "an honest but unfortunate human mistake", making it impossible for them to decrypt - and uncover - the final results.[...] 

AI Code-generation Anecdote

Read today:

"I worked in AI from 1975 to 1995; several years of that was in automatic programming. I constantly hear that AI is replacing programmers and find this to be unbelievable. So I decided to give GROK an impossible task. I asked it to write a merge sort program in Common Lisp. It did using linked lists. So then I asked it to do the same thing but using vectors. It wrote a correct program again. So then I asked it to write it to write a concurrent version. Again, it did. I was amazed! Unfortunately, each version was horribly inefficient. The list and vector versions were identical except for the functions that created lists and vectors.

At each level of the merge they created new arrays instead of manipulating the original storage structures. Similarly, the concurrent version created a new thread for each merge. In real-world applications, these generated functions would have been, I imagine, orders of magnitude slower than a hand-written merge sort. You might as well use bubble sort. :) ChatGPT was even worse. Clearly, what these systems do is the first phase of Sussman's PhD Hacker system.

No intelligence, just simple pattern-matching of a provide specification to the specification associated with code found on the Internet. The impressive part is being to match the two specifications, written in English, which are probably somewhat different."

Sunday, November 23, 2025

AI Produces Filthy Songs

From METRO of the UK, 19 11 2025


It would appear that - some - AI-powered robots have a very filthy mind. If you want to listen to the song, you can click on the You Tube link. 

Warning: The song is truly packed with obscenities and graphically sexual content. 

What is troubling is that - apart from the nature of the lyrics - if someone had played the clip to me without telling me it had been AI-generated, I wouldn't have known. This could genuinely devastate the music industry: we could end up with a situation where 90% of the content online is AI-generated. And, beyond, this will certainly put many actors out of work - extras, for a start, will be a thing of the past in the film industry - and even writers of fiction. 

AI should be able to produce content 'in the style of' quite easily; it may find it harder to produce genuinely original content, however: essentially, what the AI tool does is scan the web for existing content and combine/edit it into a (newish) finished product. 

In fact, another example, this time in Jazz style, may be found here:

_________




Friday, November 21, 2025

Thursday, November 20, 2025

SIM-swap fraud [Mobile telephones and crime]

From article published on British bank Charter Savings' website 


The link takes you to the article. They cover 3 types of fraud that are on the rise in the UK and give advice. The 1st one seems to be the most diabolical to me. I have reproduced it below. 

______________________________________________________________________

SIM-swap fraud
Have you heard of SIM swapping? It’s when criminals hijack someone’s mobile phone number by transferring it to a new SIM card under their control.
We’re seeing a huge spike in fraudsters using this tactic. Nearly 3,000 unauthorised SIM swaps were logged on the National Fraud Database in 2024 – that’s an increase of more than 1,000% on 2023.1
You may have also heard about the recent cyberattacks on UK-based international retailers, data breaches like this are being used by SIM-swap fraudsters.
They’re also using phishing and social engineering to deceive and manipulate individuals into sharing their personal information. If you overshare your personal details online this could be another way they can collect your information – never publicly share your bank account details online.
They take the personal information they’ve gathered, contact the victim’s mobile provider posing as the customer and request a SIM swap, often citing a lost or stolen phone.
Once they’re in control of the number, criminals intercept one-time passcodes sent via SMS to take over the victim’s accounts. They can then use available websites and apps to apply for a bank loan, cancel holidays to get a refund or even steal wages from gig economy workers.
And it doesn’t stop there. Even if the SIM is recovered, fraudsters can plant backdoors such as password resets and link devices to gain repeated access or harvest sensitive data to sell on the dark web.
How to protect yourself:
  • Protect your SIM card by enabling a PIN in your device’s settings menu and setting up a carrier level password or PIN with your network provider which must be verified before issuing a new SIM.
  • Don’t respond to unsolicited emails, texts or phone calls.
  • Don’t overshare personal details on social media. Avoid sharing your birth date or that of children or relatives or other common password recovery phrases such as the name of your first pet or school.
  • Turn on Two-Step Verification (2SV), also known as two-factor authentication (2FA) or multi-factor authentication (MFA).
  • Use a password consisting of three random words that only you know and which are unique. You could add uppercase letters, numbers and symbols to make it more secure.
  • Always keep your device’s software up to date.
Three steps to take if you think your SIM card has been swapped:
  1. Call your network provider immediately. If you unexpectedly lose phone service, receive unsolicited texts or emails about your SIM being ported or a Port Authorization Code (PAC) request, notify your provider.
  2. Inform your banks as soon as possible. The fraudster may attempt to make a money transfer online or over the phone.
  3. Record your details with Cifas. They’re a UK fraud prevention community.2


_____________

Wednesday, November 12, 2025

Robot Falls

From BBC


He had had too many shots of vodka ahead of the event to steady his nerves... 

As launches go, this is the disaster everyone behind the humanoid robot would have dreaded. 
___________________

Footage shows the moment Russia's first anthropomorphic robot, AIdol, fell just seconds after its debut at a technology event in Moscow.
The robot was being led on stage to the soundtrack from the film 'Rocky', before it suddenly lost its balance and fell. Assistants could then be seen scrambling to cover it with a cloth - which ended up tangling in the process.

Sunday, November 9, 2025

Vibe Coding

From BBC

'Vibe coding' sounds pretty scary to me, in fact: what could possibly go wrong? We'll know when a plane falls out of the sky. 

As for the other words, they are generally covered by existing words or not that useful (e.g.: coolcation, because a vacation is a holiday centered on time you hope to be spending with interesting bovines...). 

My favorite would be taskmasking, which is as old as work itself, though. As for micro-retirement, I prefer macro-retirement, which is what you do when you actually, well, retire - something every 20-year-old in the West seems to crave, nowadays, as they are so tired, bored and blasé already, even before they have even started working. 

25 years ago, an Italian researcher, developed a code generation system that used speech as its input.

20 years ago, Microsoft SQL Server Database Management System supported an English language query mechanism, in effect, taking English statements and converting them into Structured Query Language queries.

IBM has a Rule Engine product that can be programmed via English-like Syntax.

As long as one asks for something that can be generated from the training set that has prior solutions, system can generate a schema, the code, and all that goes with it.

But once you are off the beaten path, one is back to puzzling out the requirements of the system that one desires to build.

Consider the UK legislation for MPG and Emissions standards as the requirements for a reporting system that, say Land Rover, must have to report the MPG and Emissions of its vehicles to UK government.  Can the text of that legislation be fed into an LLM system and out would come a GUI, codified business rules, the database, and the queries that would furnish to UK government the mandated Clean Air Data?

I think not.

It takes real analysis and transformation by actual human beings to take that legislation into Programming Requirements.  And no one can write those software requirements at the level that can be fed to LLM and out would come an entire system.

LLMs would need to have been trained on training sets, in any case, which include numerous such systems.

For limited domains, small in scope (class, method, database schema) this can be done.  And even then, the trouble begins when the LLM-generated system needs to evolved.  Since Computer Programs are mathematical objects, one is back to needing people with the mathematical aptitude for the changes and maintenance of the system.

If a real system with 1 million lines of code could be generated by LLM, then you have a breakthrough, without a doubt.

Another example would be a simulator for Intel 8080 chip; can one ask an AI code-genrator to produce one?

We will see.

(I could not get ChatGPT or Copilot to give me the correct code for creating a specific geometric structure in FreeFem++...)

I suppose some will say that this point will come, and perhaps sooner than we think. 

The problem is that one would need to check there were no mistakes in the coding, I suppose, as machines also make mistakes, don't they? 

_____________


If you've ever wanted to create your own computer program but never learnt how to code, you might try "vibe coding".
Collins Dictionary's word of the year - which is confusingly made up of two words - is the art of making an app or website by describing it to artificial intelligence (AI) rather than by writing programming code manually.
The term was coined in February by OpenAI co-founder Andrej Karpathy, external, who came up with the name to represent how AI can let some programmers "forget that the code even exists" and "give in to the vibes" while making a computer program.
It was one of 10 words on a shortlist to reflect the mood, language and preoccupations of 2025. [...] 

About Me

My photo
I had been a senior software developer working for HP and GM. I am interested in intelligent and scientific computing. I am passionate about computers as enablers for human imagination. The contents of this site are not in any way, shape, or form endorsed, approved, or otherwise authorized by HP, its subsidiaries, or its officers and shareholders.

Blog Archive