04 December 2020

The Hacker’s Tribute Vol. 59: AWS-omeness goes Dark


Greetings, Hackers!

It’s a glamourous time, with spy skills and 1980’s-level ingenuity pushing our spell checkers to the limits! We’ll explore Kaspersky’s latest tool to stop the world from sneaky activities, whilst Amazon comes to a grinding halt -and what you should do about it. Expect Raspberry-Pi to present its latest offerings, whilst a dazzling group of geniuses create neural imagery based on limited inputs.

Oh, it’s going to be an exciting one, folks!

Let’s get cracking!

Dan 'The Man' Kowalski

Dan ‘the Man’ Kowalski

Editor-in-Chief, The Hacker’s Tribute

How Neurally Radiant!

The geniuses are at it again. Here, we explore Neural Radiance Fields from One or Few Images. By using limited visual cues, the network assumes a 3D view of each image, providing radiant coverage from a variety of angles. It’s the first step towards creating complete renderings of images, with limited inputs. The robots won’t yet take over, but they can get a pretty good idea of what your coffee table looks like from the side.

I Spell Trouble

Once upon a time, we relied on our brains to spell words ‘correcto-ly’. Innovation in user features was a little less existent – of those pushing more superficial boundaries. One thing is for sure – we indeed take advantage of it today! Spell checks are everyone’s saving grace, even The Hacker’s Tribute! But back in 1984, major developments came in the plainest packaging. Orwell’s Big Brother may not have appeared – but writing a spellchecking in the mid-1980s was a colossal deal. Read the post for this inspiring tale of strength, and 80’s flash!

Tiny, Tremendous Tools

Speak in whispers, from now on. That’s because the good people at KasperskyLab have cracked the code. They’ve made it possible to capture network communications from a smartphone or any wi-fi connected device. But don’t worry – it’s well-intentioned! Use the TinyCheck tool to verify any suspicious, evil, malicious, insidious, or infectious communication coming from a suspected device, through using heuristics or specific Indicators of Compromise (IoCs).

Beginning the Big-endian!

What could bring more happiness than an all-new Big-endian mode supported for the Raspberry Pi [0-3], complete with bootable images? Feel the energy with bootable disk images available in official daily snapshots, and the ability to enjoy aarch64eb/armeb on Pi’s through only flashing images to microSD. And before you say ‘it’s a great time to be alive’ – it isn’t universally supported. But all in due time, guys! In the meantime, expect a rollout that’ll rock your world.

AWS-omeness goes Dark

Amazon, a small, US-based book retailer/world domination machine/doorbell manufacturer, has its hands, nose, and eyebrow in almost every aspect of life. Its AWS servers have blossomed into one of the world’s leading sources of online power. Yet, with a recent power outage, it proves that even Achilles was as strong as his heel. Read this post on how to combat such glitches. The post discusses Multi-cloud, Multi-region, and disaster mitigation. Worth a read, if saving the world, and your projects’ dignity is ‘kinda your thing’.

Knowledge is free and shared. We’re always on the lookout for new insights into the world of Web and Mobile App Development.

We’ll be in touch with more news, as it happens!

Read Tech Stories from Experienced Devs!


Hackers of the world dream to be him. And that’s an understatement. With methods decades ahead of cyberspace, he’s proceeded only by his own reputation. ‘The Man’ infamous for single-handedly causing the ’08 global financial meltdown, he dropped off-grid searching for purpose. He twice-dominated each of the Himalayan peaks, negotiated the rift valleys of Africa, and swam the Amazonian Basin end-to-end. It was in Siberia where we caught up to him – convincing him to work for the ‘good guys’. The veteran’s veteran of coding, now confidently within our ranks, is finally a force for good. Just don’t test him.