crypto page 2 - Dave's Blog

Search
My timeline on Mastodon

Leaking Information Through Delicious

2008 May 18, 6:45

While re-reading Cryptonomicon I thought about what kind of information I'm leaking by posting links on Delicious. At work I don't post any Intranet websites for fear of revealing anything but I wondered if not posting would reveal anything. For instance, if I'm particularly busy at work might I post less indicating something about the state of the things I work on? I got an archive of my Delicious posts via the Delicious API and then ran it through a tool I made to create a couple of tables which I've graphed on Many Eyes

I've graphed my posts per week and with red lines I've marked IE7 and IE8 releases as stated by Wikipedia. As you can see, there doesn't seem to be much of a pattern so I suppose my concerns we're unfounded. I use it for both work and non-work purposes and my use of Delicious isn't that consistent so I don't think it would be easy to find a pattern like I was thinking about. Perhaps if many people from my project used Delicious and that data could be compared together it might be easier.
For fun I looked at my posts per day of week which starts off strong on Mondays and decreases as the week goes on, and my posts per hour of day. It looks like I mostly post around lunch and on the extremes I've only posted very late at night twice at 4am: converting media for the Zune, and Penn's archive of articles. In the morning at 7am I've posted only once: document introducing SGML.PermalinkCommentsmanyeyes graph cryptonomicon delicious

Finally finished Baroque Cycle Novels

2008 May 2, 10:20
[The cover of Cryptonomicon][The cover of Quicksilver][The cover of The Confusion][The cover of The System of the World]

I've finally finished the Baroque Cycle, a historical fiction series set in the 17th and 18th centuries by Neal Stephenson whose work I always enjoy. There were often delays where I'd forget about the books until I had to take plane somewhere, or get discouraged reading about the character's thoughts on economics, or have difficulty finding the next volume, or become more engrossed in other books, projects or video games, and leave the Baroque Cycle books untouched for many months at a time. Consequently, my reading of this series has, I'm ashamed to say, spanned years. After finishing some books which I enjoy I end up hungry for just a bit more to read. For this series I don't need a bit more to read, I'm done with that, but I do want a badge or maybe a medal. Or barring that, college credit in European History and Macro Economics. I can recommend this book to anyone who has enjoyed Neal Stephenson's other work and has a few years of free time to kill.

PermalinkCommentshistory neal stephenson baroque cycle book nontechnical

Solving the Enigma - History of the Cryptanalytic Bombe

2008 Apr 9, 2:36History of Enigma in WW2: "One particular German code clerk continually used his girlfriend's name, Cillie, for his messages, and so these easy-to-guess indicators became known as "Cillies.""PermalinkCommentshistory encryption cryptography article security nsa enigma

A complete break of the KeeLoq access control system

2008 Apr 4, 9:48I wonder if my car uses KeeLoq: "Hence, using the methods described by us, an attacker can clone a remote control from a distance and gain access to a target that is protected by the claimed to be "highly secure" KeeLoq algorithm."PermalinkCommentscryptography rfid security keeloq via:schneier car

BBC NEWS | Technology | Colossus cracks codes once more

2007 Nov 15, 4:03Colossus set to compete against modern PC in decrypting Nazi messages in promotion of museum.PermalinkCommentsbbc article computer cryptography encryption hardware history turing

Encrypted E-Mail Company Hushmail Spills to Feds

2007 Nov 15, 12:27Article on encrypted email company Hushmail giving email up to The Man. Includes interview with Hushmail CTO Brian Smith.PermalinkCommentsencryption article cryptography crypto anonymity anonymous email government privacy webmail mail legal security

Gmail S/MIME for Firefox

2007 Oct 15, 1:33Info on a plugin for FireFox that gives GMail S/MIME support. This is a similar idea to the last but these folks have executed the idea in a different fashion.PermalinkCommentsarticle browser blog cryptography crypto mail mime mozilla pgp privacy security extension firefox gmail google

Gustavus Selenus - Nine Books of Cryptography

2007 Sep 12, 1:06As close to the Cryptonomicon as you'll be able to find. The first few chapters of a rare 17th century work on cryptography.PermalinkCommentsbook history crypto cryptography

Enough With The Rainbow Tables: What You Need To Know About Secure Password Schemes

2007 Sep 11, 12:01PermalinkCommentshack hackers crypto cryptography security blog article hash password authentication via:swannman

The Uneasy Relationship Between Mathematics and Cryptography

2007 Aug 13, 2:05PermalinkCommentsmath article history cryptography

Seeing through walls

2007 Apr 23, 1:13Researcher applies Van-Eck phreaking style attack to flat panel (non CRT) displays.PermalinkCommentssecurity article privacy hack van-eck-phreaking phreaking cryptonomicon

boz - web bookmarking

2007 Apr 8, 9:02Bookmark things on delicious very privately. This is an actual tool this time that uses encryption to ensure that even delicious doesn't know what you bookmarked.PermalinkCommentsbookmark cryptography encryption privacy delicious tag tagging tool

wikileaks.org

2007 Mar 19, 1:23A site dedicated to creating a tool for leaking documents in an uncensorable fashion.PermalinkCommentswiki politics censorship government privacy security crypto cryptography

Bruce Schneier Facts (Everybody Loves Eric Raymond)

2007 Jan 29, 2:16This is Chuck Norris facts for Bruce Schneier. Example: "SSL is invulnerable to man-in-the-middle attacks. Unless that man is Bruce Schneier.", "Bruce Schneier doesn't keep secrets -- they keep themselves out of fear.PermalinkCommentseric-raymond bruce-schneier security humor encryption crypto nerd

Side Channel Cryptanalysis of Product Ciphers

2006 Nov 27, 3:07ABSTRACT: Building on the work of Kocher, we introduce the notion of side-channel cryptanalysis: cryptanalysis using implementation data. We discuss the notion of side-channel attacks and the vulnerabilities they introduce, demonstrate side-channel attackPermalinkCommentscryptography essay reference bruce-schneier

Microsoft's Vision for an Identity Metasystem

2006 Nov 6, 4:34Linked from http://www.identityblog.com/. Good paper on the structure of the Identity Metasystem talked of on the identityblog.PermalinkCommentsidentity security privacy microsoft msdn article internet authentication cryptography read programming information metasystem infocard passport

Kim Cameron’s Identity Weblog

2006 Nov 6, 4:32Blog on Identity. Jim mentioned this and I'd seen it around previously. Good links to other things I've wanted to know more about like Infocard and Passport. Good thoughts on Identity in general. Very interesting.PermalinkCommentsidentity blog security privacy microsoft internet authentication cryptography programming information

Tor: An anonymous Internet communication system

2006 Sep 25, 12:32PermalinkCommentsanonymity cryptography firefox internet p2p privacy rights security social tool

Handbook of Applied Cryptography

2006 Sep 25, 12:31Free textbook on CryptographyPermalinkCommentsalgorithm book education reference security software math development cryptography authentication

NewOrder - news: JustUs Book Coder: An Unbreakable* Code Utility for the Masses

2006 Apr 3, 4:06PermalinkCommentssecurity cryptography tool programming privacy development csharp book-cypher
Older EntriesNewer Entries Creative Commons License Some rights reserved.