They’re rare: The one Dubielzig really wants is an eye from a giant squid, which has the biggest eye of any living animal — it’s the size of a dinner plate. “But there are no intact specimens of giant squid eyes, only rotten specimens that have been beached,” he says. As usual, you can also … Read More “Friday Squid Blogging: Eyeball Collector Wants a Giant-Squid Eyeball” »
There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes from the successful revolutions in Tunisia (2010-11), Egypt (2011), and Ukraine (2013). The second is that it has made them more ineffectual. Derided as “slacktivism” or “clicktivism,” the … Read More “Book Review: Twitter and Tear Gas, by Zeynep Tufekci” »
A set of documents in Pakistan were detected as forgeries because their fonts were not in circulation at the time the documents were dated. Powered by WPeMatico
I have a soft spot for interesting biological security measures, especially by plants. I’ve used them as examples in several of my books. Here’s a new one: when tomato plants are attacked by caterpillars, they release a chemical that turns the caterpillars on each other: It’s common for caterpillars to eat each other when they’re … Read More “Tomato-Plant Security” »
“Traffic shaping” — the practice of tricking data to flow through a particular route on the Internet so it can be more easily surveiled — is an NSA technique that has gotten much less attention than it deserves. It’s a powerful technique that allows an eavesdropper to get access to communications channels it would otherwise … Read More “More on the NSA’s Use of Traffic Shaping” »
Some of the ways artists are hacking the music-streaming service Spotify. Powered by WPeMatico
This article argues that AI technologies will make image, audio, and video forgeries much easier in the future. Combined, the trajectory of cheap, high-quality media forgeries is worrying. At the current pace of progress, it may be as little as two or three years before realistic audio forgeries are good enough to fool the untrained … Read More “The Future of Forgeries” »
Counting squid is not easy. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico
This teapot has two chambers. Liquid is released from one or the other depending on whether an air hole is covered. I want one. Powered by WPeMatico
The Intelligence Advanced Research Projects Activity (IARPA) is soliciting proposals for research projects in secure multiparty computation: Specifically of interest is computing on data belonging to different — potentially mutually distrusting — parties, which are unwilling or unable (e.g., due to laws and regulations) to share this data with each other or with the underlying … Read More “DNI Wants Research into Secure Multiparty Computation” »