analysis - Dave's Blog

Search
My timeline on Mastodon

Retweet of robleathern

2015 Oct 3, 7:44
Crunching @nytimes ad analysis: It costs consumers 16.6x more in data costs than top 50 news sites make on them in mobile ad$ @BenedictEvans
PermalinkComments

Tweet from David_Risney

2015 Feb 8, 11:17
Analysis of 2011 DARPA Challenge tracks down the trolls who destroyed their competitors crowd sourced solution. https://medium.com/backchannel/how-a-lone-hacker-shredded-the-myth-of-crowdsourcing-d9d0534f1731 …
PermalinkComments

A high-profile fork: one year of Blink and Webkit Some stats...

2014 Jun 3, 9:10


A high-profile fork: one year of Blink and Webkit

Some stats and analysis at a very high level of the Blink fork from Webkit.

PermalinkCommentstechnology browser webkit blink apple google

PIN number analysis

2012 Sep 19, 6:03

An analysis of leaked PIN numbers.

… nearly 11% of the 3.4 million passwords are 1234 !!!

PermalinkCommentspin security technical password

Why 'Nigerian Scammers' Say They're From Nigeria (microsoft.com)

2012 Jun 20, 5:05

Far-fetched tales ofWest African riches strike most as comical. Our analysis suggests that is an advantage to the attacker, not a disadvantage. Since his attack has a low density of victims the Nigerian scammer has an over-riding need to reduce false positives. By sending an email that repels all but the most gullible the scammer gets the most promising marks to self-select, and tilts the true to false positive ratio in his favor.

PermalinkCommentshumor security scam

Crypto breakthrough shows Flame was designed by world-class scientists | Ars Technica

2012 Jun 7, 9:12

So this is another Stuxnet by Israel/US?

The analysis reinforces theories that researchers from Kaspersky Lab, CrySyS Lab, and Symantec published almost two weeks ago. Namely, Flame could only have been developed with the backing of a wealthy nation-state. … “It’s not a garden-variety collision attack, or just an implementation of previous MD5 collisions papers—which would be difficult enough,” Matthew Green, a professor specializing in cryptography in the computer science department at Johns Hopkins University, told Ars. “There were mathematicians doing new science to make Flame work.”

PermalinkCommentstechnical security web internet md5 cryptography flame

Image Error Level Analysis with HTML5

2012 Apr 16, 1:59

Javascript tool says if a photo is shopped. It can tell by looking at the pixels. Seriously. Links to cool presentation on the theory behind the algorithm behind the tool: http://www.wired.com/images_blogs/threatlevel/files/bh-usa-07-krawetz.pdf

PermalinkCommentstechnical javascript jpeg photoshop

Notabilia – Visualizing Deletion Discussions on Wikipedia

2011 Jan 10, 9:41PermalinkCommentswikipedia visualization infographics design analysis humor

An Analysis of Browser Domain-Isolation Bugs

2010 Oct 28, 7:49PermalinkCommentsdavid-ross security browser research web webbrowser technical todo system:filetype:pdf system:media:document

Google Prediction API - Google Code

2010 Aug 13, 11:46RESTful machine learning API from Google... "The Prediction API implements supervised learning algorithms as a RESTful web service to let you leverage patterns in your data, providing more relevant information to your users. Run your predictions on Google's infrastructure and scale effortlessly as your data grows in size and complexity."PermalinkCommentsrest ai google programming analysis machine-learning development technical

Time Traveler Caught in Museum Photo? | forgetomori

2010 Apr 16, 1:08Analysis of a potentially time travelling individual captured in a 40s photo "Reopening of the South Fork Bridge after flood in Nov. 1940".
PermalinkCommentshumor history photo photography time-travel via:boingboing

PeteSearch: How to split up the US

2010 Feb 22, 5:52Analysis of Facebook friend connections by US cities to determine partitioning of the US.PermalinkCommentsblog visualization facebook social map geo network graph

John Resig - Deep Tracing of Internet Explorer

2009 Nov 19, 3:46A free tool dynaTrace Ajax provides "full tracing analysis of Internet Explorer 6-8 (including JavaScript, rendering, and network traffic)". Looks pretty too...PermalinkCommentsie ie6 ie7 ie8 performance web http html javascript browser technical

Analysis of the Green Dam Censorware System

2009 Jun 12, 12:20"We have discovered remotely-exploitable vulnerabilities in Green Dam, the censorship software reportedly mandated by the Chinese government. Any web site a Green Dam user visits can take control of the PC. According to press reports, China will soon require all PCs sold in the country to include Green Dam. This software monitors web sites visited and other activity on the computer and blocks adult content as well as politically sensitive material."PermalinkCommentscensorship china hack security internet greendam

Game Theory in The Dark Knight: the opening scene (spoilers) - Mind Your Decisions by Presh Talwalkar

2009 Feb 10, 11:22Game theory analysis of the opening scene of Dark Knight.PermalinkCommentsgame-theory analysis economics movie batman

The igraph library for complex network research

2008 Nov 5, 3:55A graphing library which includes variaous graph visualization algorithms. GNU licensed. "igraph is a free software package for creating and manipulating undirected and directed graphs. It includes implementations for classic graph theory problems like minimum spanning trees and network flow, and also implements algorithms for some recent network analysis methods, like community structure search."PermalinkCommentsreference free development programming visualization graph math library opensource c++ igraph graphviz via:mattb

Cryptography and the Law... - sci.crypt | Google Groups

2008 Oct 27, 1:39Rubber-hose cryptanalysis is first defined by Marcus J. Ranum on Oct 15 1990: "..unless you resort to the rubber-hose technique of cryptanalysis. (in which a rubber hose is applied forcefully and frequently to the soles of the feet until the key to the cryptosystem is discovered, a process that can take a surprisingly short time and is quite computationally inexpensive)"PermalinkCommentshumor cryptography rubber-hose security

Presidential Election 2008 FAQ

2008 Oct 13, 10:53"This is an FAQ (Frequently Asked Questions list) for the 2008 United States Presidential Election. I need to disclose up front that I am an Obama supporter. However, with the exception of the very last question, this FAQ is designed as a collection of factual information (such as the latest poll results) and of analysis that is as objective as possible."PermalinkCommentsvia:kris.kowal politics election obama mccain

FORA.tv - Neal Stephenson: Science Fiction as a Literary Gen

2008 Jul 14, 4:37"Neal Stephenson delivered a talk entitled The Fork: Science Fiction versus Mundane Culture at Gresham College." Talk is sort of pop analysis of geeky entertainment. Lots of annecdotal evidence but interesting ideas anyway.PermalinkCommentsgeek history neal-stephenson scifi fiction literature culture video

Major Carmakers and the Automotive X Prize - X Prize Cars

2008 Feb 11, 3:05Why major carmakers won't want to participate in the Automotive X Prize, a contest to develop a 100mpg car.PermalinkCommentsxprize contest blog post analysis car x-prize
Older Entries Creative Commons License Some rights reserved.