For the past several years and particularly in the wake of the Edward Snowden revelations, interest in encrypted and anonymous communications has spread to a much wider audience.
As reported by SocialTimes last year, many users are signing user agreementswithout reading them. As a result, they are giving away the rights to the reproduction of their content often without even realizing. A recent survey fromScoopshot, a photo and video service that connects content creators with advertisers, shows that the situation has not improved.
The discovery last week of another major flaw in TLS was announced, nicknamed “Logjam” by the group of prominent cryptographers who discovered it. It’s getting so hard to keep track of these flaws that researchers at INRIA in France created a “zoo” classifying the attacks (which is not yet updated to include Logjam or the FREAK attack discovered in March). Despite the fact that these attacks seem to be announced every few months now, Logjam is a surprising and important finding with broad implications for the Internet. In this post I’ll offer a technical primer of the Logjam vulnerability.
In part 1, we described the technical details of Logjam. Here we’ll discuss some of the disturbing questions this vulnerability raises about secure communication on the Internet and NSA’s apparent failure in its “information assurance” role to keep the Internet safe from large-scale threats.
Every year, Mary Meeker, partner at Kleiner Perkins Caufield & Byers, releases her internet trends report full of insight about everything from mobile device usage to internet usage breakdowns. Meeker unveiled the 2015 report at Recode’s Code conference today. Here’s the full report:
In the beginning there was SMS. Then came emoji. Now, there is MimeChat. If you’ve ever wanted to dye your hair purple or fish-slap a friend in the face but didn’t quite have the nerve, now’s your chance. Virtually, of course. A free app for iPhone and Android, MimeChat allows you to create an animated avatar that can converse with others through the act of mime. Choose from more than 60 mimes expressing the full spectrum of human emotion, from happy, excited and in love to mildly violent. You can also customize your avatar with an array of skin tones, hairstyles, clothes and accessories. If you…
The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals.
The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia.
The story of Silk Road, how it grew into a $1.2 billion operation, and how federal law enforcement shut it down.
“The conversation is constructed as being about student privacy, but it’s really about who has the right to monitor which youth“.
Earlier this week the Stockholm District Court ordered the Pirate Bay’s .SE domains to be handed over to the Swedish state, arguing that they were linked to copyright crimes.
Emoji are incredibly popular. Our traffic stats show that unequivocally. Stories about new emoji, how we use them and just about every other aspect of the culture around them do incredibly well.
Search giants Google and Yahoo are interested in buying Flipboard, a newsreader app, according to the Wall Street Journal.
Another day, another hack. The Associated Press is reporting that hackers stole sensitive tax information from over 100,000 taxpayers.
Discover more from Erkan's Field Diary
Subscribe to get the latest posts sent to your email.