Create an Account
username: password:
 
  MemeStreams Logo

Twice Filtered

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   (Computer Security)
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
From User: Decius

Current Topic: Computer Security

How Crypto Won the DVD War | Threat Level from Wired.com
Topic: Computer Security 6:23 am EST, Feb 27, 2008

Support from studios has been widely cited as the reason for Blu-ray's victory, but few consumers know that the studios were likely won over by the presence of a digital lock on movies called BD+, a far more sophisticated and resilient digital rights management, or DRM, system than that offered by HD DVD.

This is very interesting.

How Crypto Won the DVD War | Threat Level from Wired.com


The Eavesdropper's Dilemma - Matt Blaze et al... [PDF]
Topic: Computer Security 8:01 pm EDT, Oct 26, 2006

This work was previously reported on Memestreams back in November 2005, when Markoff wrote about in NYT. There must be some reason why it is being revisited now, but it may not be publicly obvious. One presumes that it came up during the Here's Looking at You... session at Phreaknic. (Is there a slide presentation for that?)

This paper examines the problem of surreptitious Internet interception from the eavesdropper’s point of view. We introduce the notion of ‘fidelity” in digital eavesdropping. In particular, we formalize several kinds of “network noise” that might degrade fidelity, most notably “confusion,” and show that reliable network interception may not be as simple as previously thought or even always possible. Finally, we suggest requirements for “high fidelity” network interception, and show how systems that do not meet these requirements can be vulnerable to countermeasures, which in some cases can be performed entirely by a third party without the cooperation or even knowledge of the communicating parties.

For practical results in real-world systems, see the authors' IEEE article, Signaling Vulnerabilities in Wiretapping Systems, in which this paper is reference #11.

In a separate work [11], we formalized the concepts of evasion and confusion as eavesdropping countermeasures and identified the “eavesdropper’s dilemma” as a fundamental trade-off in certain interception architectures.

The Eavesdropper's Dilemma - Matt Blaze et al... [PDF]


Computer System Under Attack
Topic: Computer Security 9:54 am EDT, Oct  7, 2006

"It has become clear that Internet access in itself is a vulnerability that we cannot mitigate. We have tried incremental steps and they have proven insufficient."
    -- Undersecretary of Commerce Mark Foulon

Computer System Under Attack


Captcha Mashup
Topic: Computer Security 11:23 pm EDT, Aug 13, 2006

"I met my wife on your captcha!!!" -- Steve, from New York

OK, this is funny... Hotornot captcha.

Captcha Mashup


Academic freedom and the hacker ethic
Topic: Computer Security 12:23 pm EDT, May 27, 2006

Hackers advocate the free pursuit and sharing of knowledge without restriction, even as they acknowledge that applying it is something else.

Tom has been published in the current issue of CACM. His article is currently number one of only 7 references to Francis Fukuyama in the ACM Digital Library. There is a report about Internet voting, two about trust in electronic commerce, an excerpt from The Social Life of Information, and an article by Grady Booch where the title is a take-off on Fukuyama's classic, The End of History. Tom's article is the only one to reference Fukuyama in the context of science/technology policy and academic freedom.

In crafting policy, is it useful to distinguish between basic knowledge and specific vulnerabilities in a finished product?

Tom's opening line refers to "the free pursuit of knowledge." The implication in Joy's argument, and in Tom's response to it, suggests that it is possible, through policy, to wall off certain areas of knowledge in a selective manner, based on some balanced assessment of risk and reward. Set aside the wisdom of the policy issue; it's not clear to me this is even possible.

So much of what turns out to be disruptive knowledge arrives unexpectedly. This much should be obvious by definition. Yet frequently it seems to be brushed aside. Joy focuses on big, deliberate endeavors; he refers to "efforts" like the Manhattan Project.

Although the history of the Internet is deeply intertwined with defense, it is worth noting that the World Wide Web was not the product of a grand-vision project. Well, actually, it was, but that big project was about physics, not information management. The Web arose from an off-the-books "effort" to organize some documentation.

Recall the recent Freeman Dyson articles that I recommended. The next supervirus is as likely to arrive courtesy of a five year old, playing in the backyard, as from a diabolical terrorist with genocidal tendencies.

Inherent in Tom's premise is the idea that one has the ability to distinguish between knowing and doing. At the bleeding edge, on zero budget, with only the vaguest ideas of the applications or impact of what you're exploring, this may not be a reasonable assumption. There is a subtlety between "doing" and "applying"; you might "do" in the lab but "apply" in the wild. But as Tom asks, what if you have no lab? When the wild is your lab, either for lack of resources, or because the wild is your object of study, "doing" and "applying" are often one in the same.

Update: Greg Conti has made the CACM issue available as a ZIP archive.

Academic freedom and the hacker ethic


VeriSign's conflict of interest creates new threat
Topic: Computer Security 7:15 am EST, Jan 25, 2006

There's a big debate going on the US and Canada about who is going to pay for Internet wiretapping.

It won't be long now until the telcos start trying to pass on the cost of wiretapping to the major content providers. It'll be likened to existing security-related overhead expenses, like "loss prevention" at retail outlets. If Barnes and Noble has to pay for private security guards, why shouldn't Amazon have to do the same?

VeriSign's conflict of interest creates new threat


VeriSign NetDiscovery [Lawful] Intercept Service
Topic: Computer Security 7:02 am EST, Jan 25, 2006

"We have the ability to access virtually any packet data network and by using mediation equipment deployed in our network, VeriSign can provide a secure, reliable, cost-efficient solution that enables carriers with GPRS or CDMA 1x technologies to comply with all lawful intercept requirements without impacting network performance."

When I see VeriSign talk about "lawful" intercept, for some reason I am reminded of a particular scene from The Simpsons episode BABF12, "Pygmoelian":

The Simpsons arrive at the Duff Days site. Homer switches off the beer music, to the kids' relief. As soon as they step out of the car, though, a live band plays exactly the same tune.

Near the entrance, a man is dressed as Surly, one of the Seven Duffs.

        [loudly] Drink Duff! [under breath] Responsibly.
        [loudly] Drink Duff! [under breath] Responsibly.

VeriSign NetDiscovery [Lawful] Intercept Service


Sony to Suspend Making Antipiracy CDs
Topic: Computer Security 1:33 pm EST, Nov 12, 2005

Stewart Baker, assistant secretary for policy at DHS, described industry efforts to install hidden files on consumers' computers.

"It's very important to remember that it's your intellectual property, it's not your computer," Baker said at a trade conference on piracy. "And in the pursuit of protection of intellectual property, it's important not to defeat or undermine the security measures that people need to adopt in these days."

Sony to Suspend Making Antipiracy CDs


Open a Kensington Laptop Lock with a roll of toilet paper.... [WMV]
Topic: Computer Security 11:14 pm EDT, May  9, 2005

This is funny.

Open a Kensington Laptop Lock with a roll of toilet paper.... [WMV]


 
 
Powered By Industrial Memetics
RSS2.0