Peru is trying to protect its territorial waters from Chinese squid-fishing boats. Blog moderation policy.
Read moreBrett Solomon on Digital Rights
July 20 2024Brett Solomon is retiring from AccessNow after fifteen years as its Executive Director. He’s written a blog post about what he’s learned and what comes next.
Read moreThis is pretty horrific:
…a group of men behind a violent crime spree designed to compel victims to hand over access to their cryptocurrency savings. That announcement and the...
Read more
6.8%, to be precise.
From ZDNet:
However, Distributed Denial of Service (DDoS) attacks continue to be cybercriminals’ weapon of choice, making up over 37% of all mitigated traffic....
Read more
Hacking Scientific Citations
July 16 2024Some scholars are inflating their reference counts by sneaking them into metadata:
Citations of scientific work abide by a standardized referencing system: Each reference explicitly mentions at least the...
Read more
Upcoming Speaking Engagements
July 15 2024This is a current list of where and when I am scheduled to speak:
- I’m speaking—along with John Bruce, the CEO and Co-founder of Inrupt—at the 18th Annual CDOIQ... Read more
Friday Squid Blogging: 1994 Lair of Squid Game
July 13 2024I didn’t know:
In 1994, Hewlett-Packard released a miracle machine: the HP 200LX pocket-size PC. In the depths of the device, among the MS-DOS productivity apps built into its...
Read more
The NSA Has a Long-Lost Lecture by Adm. Grace Hopper
July 12 2024The NSA has a video recording of a 1982 lecture by Adm. Grace Hopper titled “Future Possibilities: Data, Hardware, Software, and People.” The agency is (so far) refusing...
Read moreApple Is Alerting iPhone Users of Spyware Attacks
July 11 2024Not a lot of details: Apple has issued a new round of threat notifications to iPhone users across 98 countries, warning them of potential mercenary spyware attacks. It’s the second...
Read moreRADIUS Vulnerability
July 10 2024New attack against the RADIUS authentication protocol:
The Blast-RADIUS attack allows a man-in-the-middle attacker between the RADIUS client and server to forge a valid protocol accept message in response...
Read more
Recent Comments