Project Zero is a focused initiative on circular economy innovation that would advance quality of life, economic equality through incubation, innovation, education and advocacy. As an island community, we import most of our goods, and export most of our waste.

Project Zero is working to get our biggest weapon against the climate crisis - the ocean - back in shape.

TURN THE TIDE ON THE CLIMATE CRISIS

Developed with a team of leading scientists and experts, supporting a phenomenal system – a system that can absorb the most carbon dioxide in the entire world and create enough oxygen for more than every second breath we take. This system is the ocean.

Nothing absorbs more carbon dioxide, nothing produces more oxygen. It’s the engine that drives climate and keeps our ball spinning.

0 = START /

02 = zerotwo = joinnow ! / O2 = OXYGEN = to heal the world

YOUTUBE CHANNEL : PROJECT ZERO

WHAT IS : ZERO DAY COMPUTING ?

A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who should be interested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.[1] An exploit directed at a zero-day is called a zero-day exploit, or zero-day attack.

The term "zero-day" originally referred to the number of days since a new piece of software was released to the public, so "zero-day" software was software that had been obtained by hacking into a developer's computer before release. Eventually the term was applied to the vulnerabilities that allowed this hacking, and to the number of days that the vendor has had to fix them.[2][3][4] Once the vendor learns of the vulnerability, the vendor will usually create patches or advise workarounds to mitigate it.

The more recently that the vendor has become aware of the vulnerability, the more likely that no fix or mitigation has been developed. Even after a fix is developed, the fewer the days since then, the higher the probability that an attack against the afflicted software will be successful, because not every user of that software will have applied the fix. For zero-day exploits, unless the vulnerability is inadvertently fixed, e.g. by an unrelated update that happens to fix the vulnerability, the probability that a user has applied a vendor-supplied patch that fixes the problem is zero, so the exploit would remain available. Zero-day attacks are a severe threat.


WHAT IS : PROJECT ZERO ?

googleprojectzero.blogspot.com

Project Zero is a team of security analysts employed by Google tasked with finding zero-day vulnerabilities.[1] It was announced on 15 July 2014



PARTS OF THE INTRODUCTION FROM THE BLOG :

This blog post discusses two vulnerabilities in HashiCorp Vault and its integration with Amazon Web Services (AWS) and Google Cloud Platform (GCP). These issues can lead to an authentication bypass in configurations that use the aws and gcp auth methods, and demonstrate the type of issues you can find in modern “cloud-native” software. Both vulnerabilities (CVE-2020-16250/16251) were addressed by HashiCorp and are fixed in Vault versions 1.2.5, 1.3.8, 1.4.4 and 1.5.1 released in August.

Interfacing with Vault requires authentication and Vault supports role-based access control to govern access to stored secrets. For authentication, it supports pluggable auth methods ranging from static credentials, LDAP or Radius, to full integration into third-party OpenID Connect (OIDC) providers or Cloud Identity Access Management (IAM) platforms. For infrastructure that runs on a supported cloud provider, using the provider's IAM platform for authentication is a logical choice.

mission is working for a world with zero barriers.

Zero Project on YOUTUBE VIDEO