Security quotes of the week
[Posted March 13, 2013 by jake]
Electronic devices often retain sensitive and confidential information far
beyond the perceived point of erasure, notably in the form of browsing
histories and records of deleted files. This quality makes it impractical,
if not impossible, for individuals to make meaningful decisions regarding
what digital content to expose to the scrutiny that accompanies
international travel. A person's digital life ought not be hijacked simply
by crossing a border. When packing traditional luggage, one is accustomed
to deciding what papers to take and what to leave behind. When carrying a
laptop, tablet or other device, however, removing files unnecessary to an
impending trip is an impractical solution given the volume and often
intermingled nature of the files. It is also a time-consuming task that may
not even effectively erase the files.
--
US
9th Circuit Appeals Court rules that border searches of electronic
devices
are subject
to the Constitution (as reported by Techdirt)
[Abdelrahman] Desoky suggests that instead of using a humdrum text document and modifying
it in a codified way to embed a secret message, correspondents could use a
joke to hide their true meaning. As such, he has developed an Automatic
Joke Generation Based Steganography Methodology (Jokestega) that takes
advantage of recent software that can automatically write pun-type jokes
using large dictionary databases. Among the automatic joke generators
available are: The MIT Project, Chuck Norris Joke Generator, Jokes2000, The
Joke Generator dot Com and the Online Joke Generator System
(pickuplinegen).
--
Science
Daily
It is best that the surveillance system be challenged and dismantled before it becomes comprehensive; once every person is tracked all the time it will be far harder to do so, especially as audio surveillance also expands. Once everyone is both tracked and listened to, it will be virtually impossible to organize resistance.
The comprehensive surveillance state, combined with measures to deal with the loyalty of the enforcer class, is the end game: it is where current trends lead. It will be justified to the public as a measure to decrease crime and protect innocents (especially children), but it will lead to a more advanced Stasi state.
--
Ian Welsh
Researchers
successfully demonstrated new security vulnerabilities in all three browsers tested - Firefox, Chrome and IE. At the conclusion of the event we received technical details about the exploit so we could issue a fix.
We received the technical details on Wednesday evening and within less than
24 hours diagnosed the issue, built a patch, validated the fix and the
resulting builds, and deployed the patch to users. Our fast turn around
time on this security issue is a reflection of the priority and focus we
place on security. Security is more than a side item for us, it's part of
our core principles.
--
Michael
Coates of Mozilla on the outcome of the Pwn2Own competition
(
Log in to post comments)