• Forbes picks up the Tech Review article.

    Updated: 2011-06-29 19:06:12
    How Visiting Competitors’ Websites May Give Away Your Business Secrets – Kashmir Hill – The Not-So Private Parts – Forbes: “” Odd that they describe a 15 year old company as a “startup”….

  • Recent interview I gave on the need for anonymity in business

    Updated: 2011-06-29 18:05:59
    Revealing Secrets with a Click – Technology Review This is a very nice interview that was just published by Technology Review on the importance of anonymity for businesses. This is a topic rarely covered. Generally either people are talking about anonymity for consumers, or businesses protecting or violating consumer privacy. Very little attention is paid [...]

  • Crockford’s History of JavaScript

    Updated: 2011-06-28 19:56:54
    Ever wonder about how we came to have the technologies and programming languages used today? Yahoo’s senior JavaScript architect Douglas Crockford gave a presentation in early 2010 that traces the developments which brought us the beloved and hated language that powers client-side web behaviors. The video is nearly two hours and only the first in [...]

  • Gnome 3

    Updated: 2011-06-22 17:25:14
    My first experience with Gnome 3 is that it frowns at me for not living up to its expectations.

  • Big public email database with some interesting efforts at privacy launched this month

    Updated: 2011-06-21 17:40:29
    The press release linked at the bottom of this post is for a new website called AddressSearch.com. While I normally ignore most of the PR blasts sent to this blog, this one seemed worth posting because of the interesting realities and conflicts it exposes. The idea is that you can use their database to find [...]

  • LDAPS: SSL vs TLS

    Updated: 2011-06-21 11:00:35
    LDAPS is used among security folks and developers pretty indiscriminately. The general gist is that the LDAP connection is encrypted between the client and server via SSL/TLS – with a lot of hand waving involved. But there is actually a slight difference in how SSL and TLS are negotiated over LDAP. TLS can be negotiated [...]

  • The difficulty of identifying attackers on the Internet and why it is impossible to fix.

    Updated: 2011-06-17 01:28:38
    This article in Scientific American does a nice job of describing why it is difficult to track attacks back to their true origins. This essay by Bruce Schneier goes farther arguing that it is fundamentally impossible to create an Internet without anonymity. The core point of both articles is that identifying the computer that a [...]

  • Sending and Receiving S/MIME Encrypted Email on iOS 5 (Beta)

    Updated: 2011-06-13 23:08:20
    My last post on the topic of S/MIME on iOS 5 got a lot of helpful comments from readers filled in the gaps left by Apple’s current lack of documentation on this topic. The previous article is still the best place for information on how to set up your device to use S/MIME. This post [...]

  • Security Apocalypse

    Updated: 2011-06-08 17:11:05
    RSA – hacked Lockheed Martin – hacked Northrup Grumman – hacked L-3 – hacked Sony – hacked Nintendo – hacked Gmail – spear phished PBS – hacked (and seriously?) There must be millions of corporate security presentations that start off with the premise that the security apocalypse will soon be upon us if security doesn’t [...]

  • Five false Security vs. Privacy arguments from salon.com

    Updated: 2011-06-07 15:55:35
    This article is a nice discussion of and rebuttal to many of the arguments made to support sacrificing privacy for security. Why “security” keeps winning out over privacy – War Room – Salon.com

  • A Very Nice Analysis of the Lockheed Martin Network Breach

    Updated: 2011-05-31 19:29:23
    Here is a really nice analysis of the recent security breach at Lockheed Martin. The short version is that is looks like their SecureID tokens got duplicated. This is almost certainly related to the security breach at EMC / RSA. Digital Dao: An Open Source Analysis Of The Lockheed Martin Network Breach

  • Photo Location risk and some good news.

    Updated: 2011-05-09 17:37:29
    Cameras and smart phones capture your location, but some sharing sites strip that information out. Also a link to an interview I did on this.

  • Bin Laden’s Computer

    Updated: 2011-05-04 16:38:55
    Time reports that Bin Laden’s computer contains a “mother lode of intel“. The article ends with the question: “The official posed the same question that’s likely on plenty of other people’s minds: ‘Can you imagine what’s on Osama bin Laden’s hard drive?’” The question on my mind is rather, with so much to lose, why [...]

Current Feed Items | Previous Months Items

May 2011 | Apr 2011 | Mar 2011 | Feb 2011 | Jan 2011 | Dec 2010