Security

Many websites rely on SSL / TLS to encrypt communication: everything from passwords to credit card numbers to emails. OpenSSL is a very widely used implementation of these encryption protocols. Right now, the internet is abuzz with the news of the ‘hearbleed’ bug. Because of a flaw in OpenSSL, attackers can extract 64 kilobytes of […]

{ 15 comments }

An international effort is being made today to fight back against internet surveillance. If you wish to take part, I suggest doing so by downloading a version of the GNU Privacy Guard for your operating system, in order to encrypt your emails. Gpg4Win is for Windows, while GPGTools is for Mac OS. Downloading the TOR […]

{ 2 comments }

There have been a number of interesting developments in the area of naval warfare recently: Chinese efforts to develop anti-ship ballistic missiles, American experiments with broad area marine surveillance, China’s declaration of an air defence identification zone, the launching of a Japanese destroyer seemingly designed for possible conversion into an aircraft carrier, the launching of […]

{ 2 comments }

This article is a good explanation of how the Bitcoin protocol actually works. This one describes some of the problems the Bitcoin system is experiencing.

{ 10 comments }

Yakuza operate much more openly than their counterparts in other countries. Crime syndicates have offices registered with local public-safety commissions. Membership is not in itself a crime. The biggest and richest group, the Yamaguchi-gumi, shelters behind a high-walled compound in a grand neighbourhood of Kobe. See also: Yakuza Also: “These lesser [sokaiya] cousins of the […]

{ 0 comments }

The August 27 – September 6 issue of The Economist includes an article discussing the military options that may be possible in Syria, in response to the alleged use of chemical weapons by the government of Bashar Assad: As The Economist went to press, it seemed clear how the attack would begin, if not when. […]

{ 2 comments }

2600 Magazine has just posted an archive with 67 hours of talks originally given at HOPE 6 in 2006. They are available for purchase at DVD quality, of free viewing via YouTube at lower quality. There is some seriously interesting stuff in here: Basics of Forensic Recovery, Binary Revolution Radio, Exploring Your World with Open […]

{ 1 comment }

Charles Stankievech does some extremely interesting photography, including this project on CFB Alert – Canada’s far-northern signals intelligence station.

{ 0 comments }

Wired on the steps now required for whistleblowers to leak evidence of wrongdoing to journalists, in an age of ubiquitous surveillance: “Get a dedicated computer or tablet: the cheapest Windows laptop will do. And pay cash, as our normal laptops have a host of automatic synchronization and similar services. Our personal web browsers also contain […]

{ 2 comments }

“What is inherently wrong with torture? Investigation as to what is wrong with torture, independent of its bad effects, may throw some light on why torture is practised and how academics obscure the purpose of torture when they debate its justification as a way of extracting information to save multiple lives in a ticking bomb […]

{ 0 comments }