October 27, 2011 2 Comments
These WIRED article described an interesting application of the side channel idea to key-log your typing by sensing mechanical vibrations.
Cryptography, Information Theory and Codes
April 22, 2011 1 Comment
The fact that most of us carry (voluntarily) a tracking device should not be news for anybody. I guess the news-worthy part is that somebody expossed what Apple and Google where doing. I am not sure it is illegal, have you checked the small font bits of the contract you signed? Me neither.
Believe me, that Apple and Google know where you are and where you have been is not the biggest of our problems with privacy as discussed in here.
(h/t) Raymond who sent this link
January 5, 2011 Leave a comment
The fact that 2011 is a prime number didn’t escape the mathematical inclined minds. Moreover, as tweeted @mathematicsprof 2011 can be expressed as the sum of the 11 consecutive primes 157+163+167+173+179+181+191+193+197+199+211.
This already sets the stage for a year that, I will dare to predict, will not be easily forgotten. A confluence of processes already in motion may result in drastic changes for the world and in particular the Internet. To wit:
As the Chinese say “May you live in interesting times” ….
December 7, 2010 2 Comments
That is a good idea, take your source code and give it to some guy bent on getting all your secrets to increase the security of your data:
The world is REALLY in the hands of crazy people
January 16, 2010 Leave a comment
A network glitch(?) that logs AT&T users into other people facebook accounts at random was reported today.
Who knows, in the future many kids could attribute their existence to a programming error. If so should we call it the Destiny_2.0 bug?
July 8, 2009 Leave a comment
This Excellent article in the WSJ described the recently broken Patterson’s Cipher. Dr. Smithline from the the Center for Communications Research in Princeton, N.J., got the cipher from a neighbour working on a school project about Thomas Jefferson. Make sure to check the interactive tab on the article for a very well done graphical description of the cipher.