"During his civil lawsuit against the People's Republic of China, Brian Milburn
says he never once saw one of the country's lawyers. He read no court documents from China's attorneys because they filed none. The voluminous case record at the U.S. District courthouse in Santa Ana contains a single communication from China: a curt letter to the U.S. State Department, urging that the suit be dismissed. That doesn't mean
Milburn's adversary had no contact with him." [China Mafia-Style Hack Attack Drives California Firm to Brink
posted by vidur
on Nov 28, 2012 -
If you've ever worked with the command prompt on a Unix-based computer, you're likely familiar with SSH
(Secure SHell), which is a program and a protocol that allows you (yes, you!) to securely access a remote system. While SSH has certainly earned the "Secure" portion of its namesake over the years, it's functionality as a shell has ironically received very little attention, and has begun to show signs of age and obsolescence: SSH doesn't work very well on mobile connections, and its support for Unicode
is buggy and incomplete. A group of MIT researchers think they've found solutions to these problems, and have created Mosh
as a potential successor to SSH, which fixes many of the old protocol's annoyances and shortcomings, while retaining all of SSH's security features.
posted by schmod
on Apr 12, 2012 -
He leaves his cellphone and laptop at home and instead brings "loaner" devices, which he erases before he leaves the US and wipes clean the minute he returns . In China, he disables Bluetooth and Wi-Fi , never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery , for fear his microphone could be turned on remotely. He connects to the Internet only through an encrypted, password-protected channel, and copies and pastes his password from a USB thumb drive. He never types in a password directly, because, he said, "Chinese are very good at installing key-logging software on your laptop."
- Travel precautions in the age of digital espionage.
posted by Artw
on Feb 13, 2012 -
This article is about new border crossing security measures that are supposedly in the works.
Cross the U.S. border in a few years, and a hidden camera may zero in on you from 150 metres away, able to recognize you by the shape of your face, perhaps by the telltale markings of your eyeball or even in the way you walk past the border guard.
In milliseconds, a supercomputer would sift through a massive "data warehouse," able to dip into your life: Credit-card purchases, travel patterns, health and banking records would all be scanned. Your old telephone conversations -- in any language -- would be instantly available, along with e-mails that you sent years ago.
Perhaps they'll even be able to read your MetaFilter posts.
posted by orange swan
on Nov 25, 2002 -
Did you install it yet?
You may want to think twice. That new software update for Windows Media Player isn't just a security update, if you read the End User License Agreement carefully, it states:
"In order to protect the integrity of content and software protected by digital rights management 'Secure Content', Microsoft may provide security related updates to the OS Components that will be automatically downloaded onto your computer."
Does anyone know anything more about this? How about recommendations for a suitable replacement for WMP?
posted by Hackworth
on Jul 1, 2002 -
Anti-rip CD system bypassed.
heh. nice try, boyos. i've never understood how people can believe something digitized can possibly be protected in such a manner as to be foolproof. what one process can scramble, another can undo. [via /.
posted by fuzzygeek
on Aug 1, 2001 -
Win XP's Product Activation as a breeze to hack.
Provided that RC1 still ships as is and you keep your RAM locked at a fixed number of sticks, it's simply a matter of keeping a backup of a DBL file. For all the ballyhoo, it's amazing that something this obvious slipped under the cracks. With WPA this sloppy, is this the only half-hearted facet of Windows XP?
posted by ed
on Jul 17, 2001 -
Beyond the bar code:
Tags on retail products will send radio signals to their manufacturers, collecting information about consumer habits -- and raising privacy concerns. Radio tag technology is already here, used in fields such in livestock, freight-train cargo and highway tolls. The only barrier to widespread use is consumer products is price. When they can be made for a penny, expect to see them everywhere. From the March issue of MIT Technology Review
posted by jhiggy
on Feb 20, 2001 -
jon kats on "geek profiling":
"W.A.V.E joins new sofware "security" programs ... being tested in public schools in America to compile and computerize information on students believed to be dangerous or potentially violent. This new rat-on-kids industry is an offshoot of the Geek Profiling anti-Net hysteria that broke out all across the United States after the Columbine High School killings, whose first anniversary is fast approaching. Despite the fact that horrific incidents like Columbine are extremely rare, and that the FBI and Justice Department have both reported that youth violence has dropped to its lowest levels in more than half a century, the belief persists in much of America that technologies like the Internet (and activities like computer gaming) are turning otherwise healthy school children into mass murderers."
posted by palegirl
on Mar 29, 2000 -