Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

August 08 2013

Four short links: 8 August 2013

  1. Reducing the Roots of Some Evil (Etsy) — Based on our first two months of data we have removed a number of unused CA certificates from some pilot systems to test the effects, and will run CAWatch for a full six months to build up a more comprehensive view of what CAs are in active use. Sign of how broken the CA system for SSL is. (via Alex Dong)
  2. Mind the Brain — PLOS podcast interviews Sci Foo alum and delicious neuroscience brain of awesome, Vaughan Bell. (via Fabiana Kubke)
  3. How Often are Ineffective Interventions Still Used in Practice? (PLOSone) — tl;dr: 8% of the time. Imagine the number if you asked how often ineffective software development practices are still used.
  4. Announcing Evan’s Awesome A/B ToolsI am calling these tools awesome because they are intuitive, visual, and easy-to-use. Unlike other online statistical calculators you’ve probably seen, they’ll help you understand what’s going on “under the hood” of common statistical tests, and by providing ample visual context, they make it easy for you to explain p-values and confidence intervals to your boss. (And they’re free!)

July 26 2013

Feds put heat on Web firms for master encryption keys | Politics and Law - CNET News

Feds put heat on Web firms for master encryption keys | Politics and Law - CNET News
http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys

The U.S. government has attempted to obtain the master encryption keys that Internet companies use to shield millions of users’ private Web communications from eavesdropping.
These demands for master encryption keys, which have not been disclosed previously, represent a technological escalation in the clandestine methods that the FBI and the National Security Agency employ when conducting electronic surveillance against Internet users.

commentaire de @reichenstein:

The Web revolution has come full circle. We started with the storm on the Bastille and now Napoleon crowned himself

#NSA #surveillance #ssl

May 02 2012

Four short links: 2 May 2012

  1. Punting on SxSW (Brad Feld) -- I came across this old post and thought: if you can make money by being a dick, or make money by being a caring family person, why would you choose to be a dick? As far as I can tell, being a dick is optional. Brogrammers, take note. Be more like Brad Feld, who prioritises his family and acts accordingly.
  2. Probabilistic Structures for Data Mining -- readable introduction to useful algorithms and datastructures showing their performance, reliability, and resources trade-off. (via Hacker News)
  3. Dataset -- a Javascript library for transforming, querying, manipulating data from different sources.
  4. Many HTTPS Servers are Insecure -- 75% still vulnerable to the BEAST attack.

January 23 2011

02mydafsoup-01

Further testing indicates they are not merely detecting "SSL or not" but rather able to detect "Tor's SSL or not" and "freegate's SSL or not" and "ultrasurf's SSL or not" and handle each individually. They are able to do this for their entirety of Internet traffic in real-time. This ability to snipe traffic is both impressive and depressing at once given the scale involved.

Update on Internet censorship in Iran | The Tor Blog. Holy shit.
Reposted fromantifuchs antifuchs
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl