2008 May 18, 6:45
While re-reading Cryptonomicon I thought
about what kind of information I'm leaking by posting links on Delicious. At work I don't post any Intranet websites for fear of revealing anything but I wondered if not posting would reveal
anything. For instance, if I'm particularly busy at work might I post less indicating something about the state of the things I work on? I got an archive of my Delicious posts via the Delicious API
and then ran it through a tool I made to create a couple of tables which I've graphed on Many Eyes
I've graphed my posts per week and with red lines I've marked IE7 and IE8 releases as stated by Wikipedia. As you can see, there doesn't seem to be much of a pattern so I suppose my concerns
we're unfounded. I use it for both work and non-work purposes and my use of Delicious isn't that consistent so I don't think it would be easy to find a pattern like I was thinking about. Perhaps if
many people from my project used Delicious and that data could be compared together it might be easier.
For fun I looked at my
posts per day of week which starts off strong on Mondays and decreases as the
week goes on, and my
posts per hour of day. It looks like I mostly post around lunch and on the extremes I've
only posted very late at night twice at 4am:
converting media for the Zune, and
Penn's archive of articles. In the morning at 7am I've posted only once:
document
introducing SGML.
manyeyes graph cryptonomicon delicious 2008 May 2, 10:20
I've finally finished the Baroque Cycle, a historical fiction series set in the 17th and 18th centuries by Neal Stephenson whose work I
always enjoy. There were often delays where I'd forget about the books until I had to take plane somewhere, or get discouraged reading about the character's thoughts on economics, or have
difficulty finding the next volume, or become more engrossed in other books, projects or video games, and leave the Baroque Cycle books untouched for many months at a time. Consequently, my reading
of this series has, I'm ashamed to say, spanned years. After finishing some books which I enjoy I end up hungry for just a bit more to read. For this series I don't need a bit more to read, I'm
done with that, but I do want a badge or maybe a medal. Or barring that, college credit in European History and Macro Economics. I can recommend this book to anyone who has enjoyed Neal
Stephenson's other work and has a few years of free time to kill.
history neal stephenson baroque cycle book nontechnical 2008 Apr 9, 2:36History of Enigma in WW2: "One particular German code clerk continually used his girlfriend's name, Cillie, for his messages, and so these easy-to-guess indicators became known as "Cillies.""
history encryption cryptography article security nsa enigma 2008 Apr 4, 9:48I wonder if my car uses KeeLoq: "Hence, using the methods described by us, an attacker can clone a remote control from a distance and gain access to a target that is protected by the claimed to be
"highly secure" KeeLoq algorithm."
cryptography rfid security keeloq via:schneier car 2007 Nov 15, 4:03Colossus set to compete against modern PC in decrypting Nazi messages in promotion of museum.
bbc article computer cryptography encryption hardware history turing 2007 Nov 15, 12:27Article on encrypted email company Hushmail giving email up to The Man. Includes interview with Hushmail CTO Brian Smith.
encryption article cryptography crypto anonymity anonymous email government privacy webmail mail legal security 2007 Oct 15, 1:33Info on a plugin for FireFox that gives GMail S/MIME support. This is a similar idea to the last but these folks have executed the idea in a different fashion.
article browser blog cryptography crypto mail mime mozilla pgp privacy security extension firefox gmail google 2007 Sep 12, 1:06As close to the Cryptonomicon as you'll be able to find. The first few chapters of a rare 17th century work on cryptography.
book history crypto cryptography 2007 Aug 13, 2:05From : "Rarely do we think of mathematicians as glamorous. But during the 1980s, the rising importance of cryptography injected a certain amount of glitz into the discipline.
math article history cryptography 2007 Apr 23, 1:13Researcher applies Van-Eck phreaking style attack to flat panel (non CRT) displays.
security article privacy hack van-eck-phreaking phreaking cryptonomicon 2007 Apr 8, 9:02Bookmark things on delicious very privately. This is an actual tool this time that uses encryption to ensure that even delicious doesn't know what you bookmarked.
bookmark cryptography encryption privacy delicious tag tagging tool 2007 Mar 19, 1:23A site dedicated to creating a tool for leaking documents in an uncensorable fashion.
wiki politics censorship government privacy security crypto cryptography 2007 Jan 29, 2:16This is Chuck Norris facts for Bruce Schneier. Example: "SSL is invulnerable to man-in-the-middle attacks. Unless that man is Bruce Schneier.", "Bruce Schneier doesn't keep secrets -- they keep
themselves out of fear.
eric-raymond bruce-schneier security humor encryption crypto nerd 2006 Nov 27, 3:07ABSTRACT: Building on the work of Kocher, we introduce the notion of side-channel cryptanalysis: cryptanalysis using implementation data. We discuss the notion of side-channel attacks and the
vulnerabilities they introduce, demonstrate side-channel attack
cryptography essay reference bruce-schneier 2006 Nov 6, 4:34Linked from http://www.identityblog.com/. Good paper on the structure of the Identity Metasystem talked of on the identityblog.
identity security privacy microsoft msdn article internet authentication cryptography read programming information metasystem infocard passport 2006 Nov 6, 4:32Blog on Identity. Jim mentioned this and I'd seen it around previously. Good links to other things I've wanted to know more about like Infocard and Passport. Good thoughts on Identity in general.
Very interesting.
identity blog security privacy microsoft internet authentication cryptography programming information