Boiledbeans

Drama! Intrigue!! Geekiness!!!

2017

Sunday, September 17, 2017

Look away

—devadutta @ 18:34

Continuing our computer security and hacking theme round.

This is Edward Snowden. What is he doing? Bonus cookie points if you tell the exact name of the exploit he is defending himself from.

Cracked by: Sumanth Patlolla and s m muneer ali

Show Answer

Unlocking his phone and doing it under a blanket to protect himself from Shoulder surfing attacks.


Wednesday, September 13, 2017

Lub Dub Lub Dub

—devadutta @ 18:31

Continuing our hacking and computer security theme round.

xkcd explaining one of the most widespread and easily exploitable vulnerabilities in recent times. In fact, the need to patch the vulnerability so urgent, security researchers wore marketing hats, created a logo and gave it a name to raise awareness (it worked really well!). Identify the exploit.

Cracked by: Sumanth Patlolla, alephnull and s m muneer ali

Show Answer

This question was automatically moderated by AutoRaja and is yet to be assigned an official answer. Please come back later


Wednesday, August 23, 2017

Finger

—devadutta @ 23:21

This man “wanted to count the number of computers on the internet” and unleashed a now legendary piece of software causing a lot of “damage”. Who is he? Fake Bonus points if you explain the post title.

Cracked by: Sumanth Patlolla, Dibyo, s m muneer ali and Supritha Maiya

Show Answer

Robert Tappan Morris, author of the Morris worm, which is arguably more piece of art.


Tuesday, August 22, 2017

MITM

—devadutta @ 16:00

Continuing our theme round. Made famous by Silicon Valley, but this device is real and used quite frequently by hackers. What is this?

Cracked by: Ashish Kumar, Dibyo, Sumanth Patlolla and s m muneer ali

Show Answer

Wifi Pineapple, used for MITM attacks on wifi connections.


Wednesday, August 16, 2017

Theme Round - Hacking and Computer Security

—devadutta @ 12:07

Theme round! Next few questions will be focused on hacking and computer security. Broadly.

In one of the earliest known instances of “hacking”, Person 1 (below) hacked a public demo of 2’s invention to show that it was not “safe and secure” as claimed 2. Identify 1.

Cracked by: Sumanth Patlolla, Dibyo, Supritha Maiya and Tej

Show Answer

Nevil Maskelyne hacked Marconi’s public demo of a Morse Code transmission to prove his invention was NOT secure.


Tuesday, August 15, 2017

Hash with 18 leading zeros

—devadutta @ 15:42

Connect. Also, don’t forget to get free stickers.

Cracked by: Sumanth Patlolla and s m muneer ali

Show Answer

Bitcoin Mining bears a lot of resemblance to how Shell money from Solomon Islands were (are) made - taking a huge sell and laboriously grinding it down to a bead to prove work and also control supply of these coins. Exactly like Bitcoin hashing.


Sunday, August 13, 2017

10 Years!

—devadutta @ 13:00

Boiledbeans turned 10 years old today! We have printed some nifty Boiledbeans stickers. Fill the form below and we will send you some!

Question for today: Identify this spacecraft, also launched 10 years ago.

Sticker form - Fill this to get some boiledbeans stickers

[contact-form][contact-field label=‘Name’ type=‘name’ required=‘1’/][contact-field label=‘Email’ type=‘email’ required=‘1’/][contact-field label=‘Mailing Address’ type=‘textarea’ required=‘1’/][/contact-form]

Cracked by: Shwetha Maiya, Sumanth Patlolla, s m muneer ali, Supritha Maiya, Dibyo and Tej

Show Answer

Phoenix Mars lander!


Tuesday, June 27, 2017

Silicon Bunny

—devadutta @ 14:25

Enough of that algorithms round. A simple question today.

Who is in that white bunny suit? Bonus points if you explain the significance of this event.

Cracked by: Sumanth Patlolla, s m muneer ali and Dibyo

Show Answer

Intel CEO Paul Otellini hands Steve Jobs a silicon wafer onstage at WWDC in 2005


Saturday, May 20, 2017

Definitely not in set

—devadutta @ 10:50

Continuing our Algorithm themed round is this plaintext question. This eponymous algorithm, made famous by Google and Akamai is used widely in databases, search engines and data analytics platforms to find if an element exists in a set or not. Which algorithm are we talking about?

Hint:

Cracked by: Dibyo

Show Answer

Bloom Filter.


Friday, May 5, 2017

The Happening

—devadutta @ 12:06

Continuing our Algorithm themed questions.

This man wanted to figure out the best way to lay out an electricity network in his country and came up with one of the most commonly used graph algorithms. Which algorithm are we talking about? Bonus points for identifying him.

Cracked by: Sumanth Patlolla and Andy

Show Answer

Otakar Borůvka’s Minimum Spanning Tree Algorithm.