Fingerprinting Digital Documents
In this era of electronic leakers, remember that zero-width spaces and homoglyph substitution can fingerprint individual instances of files…. Continue reading Fingerprinting Digital Documents
Collaborate Disseminate
In this era of electronic leakers, remember that zero-width spaces and homoglyph substitution can fingerprint individual instances of files…. Continue reading Fingerprinting Digital Documents
My network admin might have a record of my default MAC address tied with some mischievous doings as well as my currently used address that they’ve likely collected after I started accessing using their controlled logins. I in… Continue reading How can a network admin uniquely identify machines on their network?
The security researchers at Princeton are posting You may know that most websites have third-party analytics scripts that record which pages you visit and the searches you make. But lately, more and more sites use "session replay" scripts. These scripts record your keystrokes, mouse movements, and scrolling behavior, along with the entire contents of the pages you visit, and send… Continue reading Websites Use Session-Replay Scripts to Eavesdrop on Every Keystroke and Mouse Movement
At my work there are certain internal sites which I can access from my home but only through my work laptop. I wonder how this works. When my work laptop is connected to the corpnet, it has one IP address. When the machine is… Continue reading How to recognize the machine from which a request is coming?
Two related stories: PornHub is using machine learning algorithms to identify actors in different videos, so as to better index them. People are worried that it can really identify them, by linking their stage names to their real names. Facebook somehow managed to link a sex worker’s clients under her fake name to her real profile. Sometimes people have legitimate… Continue reading Technology to Out Sex Workers
In the wake of the Equifax break, I’ve heard calls to replace Social Security numbers. Steve Bellovin explains why this is hard…. Continue reading Replacing Social Security Numbers
This is a good interview with Apple’s SVP of Software Engineering about FaceID. Honestly, I don’t know what to think. I am confident that Apple is not collecting a photo database, but not optimistic that it can’t be hacked with fake faces. I dislike the fact that the police can point the phone at someone and have it automatically unlock…. Continue reading Apple’s FaceID
We have no idea how bad this really is: On 30 August, an international team of researchers informed the Estonian Information System Authority (RIA) of a vulnerability potentially affecting the digital use of Estonian ID cards. The possible vulnerabilit… Continue reading Security Flaw in Estonian National ID Card
We have no idea how bad this really is: On 30 August, an international team of researchers informed the Estonian Information System Authority (RIA) of a vulnerability potentially affecting the digital use of Estonian ID cards. The possible vulnerability affects a total of almost 750,000 ID-cards issued starting from October 2014, including cards issued to e-residents. The ID-cards issued before… Continue reading Security Flaw in Estonian National ID Card
We are developing an website which serves end users of many organizations
(banks , municipalities etc).
We have already setup meetings with the banks and they’ve agreed to work with us.
Ok so let’s say that a user user1 of… Continue reading How can we show our end-users that we are trusted by a bank?