2010 Apr 21, 6:49
"OAuth provides a method for clients to access server resources on behalf of a resource owner (such as a different client or an end-user). It also provides a process for end-users to authorize
third-party access to their server resources without sharing their credentials (typically, a username and password pair), using user-agent redirections."
2010 Apr 21, 6:47
"After years of secrecy (and the occasional leak), a draft of the Anti-Counterfeiting Trade Agreement (ACTA) treaty has finally been released by negotiators. We've delved deep into the treaty,
highlighting its numerous problems. Indeed, there's a lot not to like about the treaty: Internet disconnections, anticircumvention prohibitions, and even the ability for rightsholders to get
injunctions if they can show infringement is imminent."
2010 Mar 9, 5:35
Comparison of US claim 'the tort of appropriation' to Google video case in Italy.
2010 Mar 8, 1:50
Paper suggests history stealing to find what popular social networking site groups a visitor to your web site belongs to and stats on how easy it is to then uniquely identify the visitor on the
popular social networking site.
2010 Mar 1, 2:24
There is an amazing amount of info around about the alleged assassination Mahmoud al-Mabhouh including this Dubai hotel survielance footage.
2010 Feb 26, 2:42
Adam Barth has tons of papers on web browser security.
2010 Feb 24, 9:21
"Onstage at TED2010, TED curator Chris Anderson interviews Google's Sergey Brin about the company's recent statement on China."
2010 Jan 29, 10:52
Another technology stolen but then remotely using the tech to get it back story.
2010 Jan 29, 10:28
"Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies." Examines HTTP headers and browser features and reports if your
configuration is unique (mine is). Good info for anyone looking at creating an anonymous browsing plugin or service
2010 Jan 26, 1:46
Intro to TOR the onion router.
2010 Jan 14, 2:54
Wow: "If the report's findings are correct, it suggests that the government of China has been engaged for months in a massive campaign of industrial espionage against US companies."
2010 Jan 12, 9:02
"We have decided we are no longer willing to continue censoring our results on Google.cn, and so over the next few weeks we will be discussing with the Chinese government the basis on which we could
operate an unfiltered search engine within the law, if at all. We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China."
2009 Dec 7, 5:15
"Yahoo isn’t happy that a detailed menu of the spying services it provides law enforcement agencies has leaked onto the web." ... "Cryptome also published lawful data-interception guides for Cox
Communications, SBC, Cingular, Nextel, GTE and other telecoms and service providers. But of all those companies, it appears to be Yahoo’s lawyers alone who have issued a DMCA takedown notice to
Cryptome demanding the document be removed."
2009 Dec 1, 9:40
Wow: 'The fact that federal, state, and local law enforcement can obtain communications "metadata"—URLs of sites visited, e-mail message headers, numbers dialed, GPS locations, etc.—without any
real oversight or reporting requirements should be shocking, but it isn't. The courts ruled in 2005 that law enforcement doesn't need to show probable cause to obtain your physical location
via the cell phone grid. All of the aforementioned metadata can be accessed with an easy-to-obtain pen register/trap & trace order. But given the volume of requests, it's hard to imagine that
the courts are involved in all of these.'
2009 Nov 23, 11:28
"Thanks to the utilization of new technology, we're now seeing large-scale success in eliminating the need for passwords while increasing the successful registration rate at websites to over
90%...In addition, after a thorough evaluation of the security and privacy of these technologies, the same techniques are being piloted by President Obama's open identity initiative to enable
citizens to sign in more easily to government-operated websites."
2009 Oct 20, 8:24
Against Transparency - The perils of openness in government. - Lawrence Lessig - October 9, 2009
2009 Aug 17, 8:37
Info on Flash cookies, US Govt websites cookie use, possible US Govt regulations on privacy/tracking users, plus a great zombie photo.
2009 May 2, 8:54
Humorous Firefox bug description: "This privacy flaw has caused my fiance and I to break-up after having dated for 5 years."
2009 Mar 26, 2:24 2009 Jan 23, 1:47
"When you experiment with Amazon's Mechanical Turk, it feels like magic. ... Last week, I started a new Turk experiment to answer two questions: what do these people look like, and how much does it
cost for someone to reveal their face?"