| |
Current Topic: Technology |
|
For IDT, the Big Flameouts Light Its Fire |
|
|
Topic: Technology |
1:23 am EST, Feb 6, 2002 |
Link and excerpt from Ditherati: Freedom of the Press Belongs to the Guy With The T-3 Connection "Sure I want to be the biggest telecom company in the world, but it's just a commodity. I want to be able to form opinion. By controlling the pipe, you can eventually get control of the content." -- IDT chairman Howard Jonas, on his plan to be Rupert Murdoch without the subtlety For IDT, the Big Flameouts Light Its Fire |
|
AOL blocks instant messaging start-up - Tech News - CNET.com |
|
|
Topic: Technology |
12:24 am EST, Jan 31, 2002 |
"But in the past 24 hours, an elaborate game of cat and mouse has developed between AOL and Trillian creator Cerulean Studios--as the start-up has repeatedly released new software designed to get around the block, prompting AOL to rush in and stop people from using it. "It has long been our very public policy that when a service unleashes software that hacks into our system, and endangers the security of our system, we stop it," AOL spokeswoman Kathy McKiernan said. McKiernan said that Trillian does not have a business relationship with AOL. "To the extent that consumers think they do, they were misled," McKiernan said. Meanwhile, the creators of Trillian plan to keep up the tit-for-tat efforts. Since AOL first started blocking the software Tuesday, they have released one workaround and at least two more full downloads of Trillian. " AOL blocks instant messaging start-up - Tech News - CNET.com |
|
The Atlantic | February 2002 | Losing the Code War | Budiansky |
|
|
Topic: Technology |
2:24 pm EST, Jan 28, 2002 |
"An effort in the Senate to revive that plan and include it in the anti-terrorism bill that was signed into law October 26 received little support and was withdrawn, and on much the same grounds%u2014that however powerful an intelligence tool code breaking was during its golden age, in World War II and the Cold War, the technical reality is that those days are gone. Code breaking simply cannot work the magic it once did. " The Atlantic | February 2002 | Losing the Code War | Budiansky |
|
SecurityFocus home news: Results, Not Resolutions |
|
|
Topic: Technology |
7:35 pm EST, Jan 26, 2002 |
As expected, self-described "longtime security expert" Bruce Schneier has responded to the recently published Microsoft internal memo outlining Bill Gates' new-found motivation for security. I think some of what he asks for is over the top, but it provides something to gauge their actual efforts against. "Making security Microsoft's first priority will require a basic redesign of the way the company produces and markets software. It will involve a difficult cultural transition inside Microsoft. It will involve Microsoft setting aside short-term gains in order to achieve long-term goals." SecurityFocus home news: Results, Not Resolutions |
|
Biometrics: Hold On, Chicken Little - TechKnowledge Newsletter |
|
|
Topic: Technology |
7:27 pm EST, Jan 26, 2002 |
Lucas Mast responds to Dorothy Denning's "Why I Love Biometrics" article. On Thursday, January 24, Joseph Atick of Visionics, Mark Rotenberg of EPIC, Dorothy Denning of Georgetown, and John Woodward Jr. of RAND met at The Cato Institute in DC for a policy forum on the topic of biometrics. Three documents, including this one and "Nameless in Cyberspace" (which discusses Georgia's HB1630), were distributed to attendees. Biometrics: Hold On, Chicken Little - TechKnowledge Newsletter |
|
Information Security Magazine |
|
|
Topic: Technology |
11:54 pm EST, Jan 24, 2002 |
JLM: Author and professor Dorothy E. Denning explains why good biometrics systems will succeed without keeping secrets. Both direct and concise, it's worth reading. She mentions two startup companies whose biometrics technologies look promising. Decius: There are so many problems with this I don't even know where to start. I just LOVE how she brushes off the privacy concerns with a few words at the bottom of the essay, and she doesn't even mention the accuracy problems and the difficulty of accuratly determining "liveness." In network computers there is a huge problem with trust of remote biometric identifiers... The key problem with this essay is that biometrics don't eliminate passwords in most implementations and really don't have anything to do with the problem with passwords. Basically, a single sign on infrastructure is the problem, biometrics or no. Fortunately, Biometrics are not the least expensive solution to the "password problem" and for that reason law enforcement is likely to be denied their dream of having your fingerprint taken every time you engage in a commercial transaction. Information Security Magazine |
|
Spyware, In a Galaxy Near You |
|
|
Topic: Technology |
2:11 pm EST, Jan 24, 2002 |
Many popular p2p programs include very intrusive spyware. Spyware, In a Galaxy Near You |
|
Bill Gates: Trustworthy Computing |
|
|
Topic: Technology |
4:08 pm EST, Jan 17, 2002 |
This is the email that Bill Gates sent out to everyone at Microsoft about their new security focus. Bill Gates: Trustworthy Computing |
|