Slashdot asks if password masking — replacing password characters with asterisks as you type them — is on the way out. I don’t know if that’s true, but I would be happy to see it go. Shoulder surfing, the threat is defends against, is largely nonexistent. And it is becoming harder to type in passwords … Read More “Password Masking” »
Month: July 2017
Humble Bundle is selling a bunch of cybersecurity books very cheaply. You can get copies of Applied Cryptography, Secrets and Lies, and Cryptography Engineering — and also Ross Anderson’s Security Engineering, Adam Shostack’s Threat Modeling, and many others. This is the cheapest you’ll ever see these books. And they’re all DRM-free. Powered by WPeMatico
News from Australia: Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm Turnbull said. Law enforcement agencies would need warrants to access the communications. “We’ve got a real problem in that the law enforcement agencies are increasingly unable to find out what terrorists … Read More “Australia Considering New Law Weakening Encryption” »
They’re rare: The one Dubielzig really wants is an eye from a giant squid, which has the biggest eye of any living animal — it’s the size of a dinner plate. “But there are no intact specimens of giant squid eyes, only rotten specimens that have been beached,” he says. As usual, you can also … Read More “Friday Squid Blogging: Eyeball Collector Wants a Giant-Squid Eyeball” »
There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes from the successful revolutions in Tunisia (2010-11), Egypt (2011), and Ukraine (2013). The second is that it has made them more ineffectual. Derided as “slacktivism” or “clicktivism,” the … Read More “Book Review: Twitter and Tear Gas, by Zeynep Tufekci” »
A set of documents in Pakistan were detected as forgeries because their fonts were not in circulation at the time the documents were dated. Powered by WPeMatico
I have a soft spot for interesting biological security measures, especially by plants. I’ve used them as examples in several of my books. Here’s a new one: when tomato plants are attacked by caterpillars, they release a chemical that turns the caterpillars on each other: It’s common for caterpillars to eat each other when they’re … Read More “Tomato-Plant Security” »
“Traffic shaping” — the practice of tricking data to flow through a particular route on the Internet so it can be more easily surveiled — is an NSA technique that has gotten much less attention than it deserves. It’s a powerful technique that allows an eavesdropper to get access to communications channels it would otherwise … Read More “More on the NSA’s Use of Traffic Shaping” »
Some of the ways artists are hacking the music-streaming service Spotify. Powered by WPeMatico
This article argues that AI technologies will make image, audio, and video forgeries much easier in the future. Combined, the trajectory of cheap, high-quality media forgeries is worrying. At the current pace of progress, it may be as little as two or three years before realistic audio forgeries are good enough to fool the untrained … Read More “The Future of Forgeries” »