Category Archive for 'Privacy & Security'

TinyDisk

Friday, November 11th, 2005

TinyDisk blows my mind by how it works. TinyDisk is a program from saving and retrieving files from TinyURL and TinyURL-like services such as Nanourl. It overlays a write-once-read-many anonymous, persistent and globally shared filesystem. Once something is uploaded, only the database admin can delete it. Everyone can read it. No one can know who […]

NASSCOM Cries ‘Entrapment’

Friday, August 19th, 2005

As the focus shifts to India further, expect more sting operations in India that try to spread the FUD on how insecure BPO outsourcing is, especially in India. NASSCOM calls it entrapment, I call it humbug.

You can’t delete those cookies, you Moron!

Tuesday, April 5th, 2005

Maninder at office sent me over to Company Bypasses Cookie-Deleting Consumers story. The New York company on Thursday unveiled what it calls PIE, or persistent identification element, a technology that’s uploaded to a browser and restores deleted cookies. In addition, PIE, which can’t be easily removed, can also act as a cookie backup, since it […]

The Honeypot Experiment

Wednesday, December 1st, 2004

Arstechnica gives a nice summary of an article in USA Today about an experiment involving ‘monitoring six “honeypot” computers for two weeks — set up to see what kind of malicious traffic they would attract.’ Less than four minutes from start of the test, an intruder breaks into Windows XP SP1. Wow. Kids, start using […]

Apache Software Foundation Refuses To Implement Sender ID

Friday, September 3rd, 2004

I just caught it on /. that ASF has refused to implement Sender ID. They’ve written an open-letter to MARID IETF Working Group about it. The current Microsoft Royalty-Free Sender ID Patent License Agreement terms are a barrier to any ASF project which wants to implement Sender ID. We believe the current license is generally […]

Vein-Recognition Security System

Wednesday, September 1st, 2004

This story on eWeek talks about banks in Japan starting the use of Fujitsu’s biometric vein-pattern recognition technology for authentication. (It) works by shining a near-infrared light on a palm placed about four centimeters above a scanner. The vein patterns illuminated under the skin appear as dark patterns, and it is this information that becomes […]