Tuesday, November 29, 2022

Interesting on both sides of the question.

https://www.bespacific.com/redacted-documents-are-not-as-secure-as-you-think/

Redacted Documents Are Not as Secure as You Think

Wired: “Popular redaction tools don’t always work as promised, and new attacks can reveal hidden information, researchers say. For years, if you wanted to protect sensitive text in a document, you could grab a pair of scissors or a scalpel and cut out the information. If this didn’t work, a chunky black marker pen would do the job. Now that most documents are digitized, securely redacting their contents has become harder. The majority of redactions—by government officials and courts—involve placing black boxes over text in PDFs. When this redaction is done incorrectly, people’s safety and national security can be put at risk. New research from a team at the University of Illinois looked at the most popular tools for redacting PDF documents and found many of them wanting. The findings, from researchers Maxwell Bland, Anushya Iyer, and Kirill Levchenko, say two of the most popular tools for redacting documents offer no protection to the underlying text at all, with the text accessible by copying and pasting it. Plus, a new attack method they devised makes it possible to extract secret details from the redacted text.”

Source: Story Beyond the Eye: Glyph Positions Break PDF Text Redaction, Maxwell Bland, Anushya Iyer, and Kirill Levchenko, University of Illinois, Urbana-Champaign, USA. 14 November 2022.





A backgrounder recorded earlier.

https://www.theregister.com/2022/11/29/the_five_cyber_attack_techniques/

The five cyber attack techniques of the apocalypse

Watch SANS experts discuss some of the most devious and dangerous methods employed by hackers in 2022

This year's RSA Conference saw SANS security experts gather to identify and discuss five of the most dangerous cyber attack techniques identified in the first half of the year. If you missed the original debate, don't worry, you have another chance to learn what you should be looking out for.





Sound familiar?

https://www.prio.org/publications/13253

Trends in the Digitalisation of EU Borders: How Experimentations with AI for Border Control Treat Migrants as Test Subjects

Border technologies provide great opportunities for efficiency and accuracy, but also potentials for harm. The EU funds research that involves experimental border control technologies, such as lie detectors for incoming third-country nationals, all while claiming that this is ‘just research’. This policy brief shows why developing artificial intelligence (AI) technology for border control in the EU is a concerning trend. Migrants are treated as justifiable test subjects, and AI can accelerate the illegal practice of migration deterrence.





Twitter’s loss is everyone else’s gain. (What happens if Twitter needs them back?)

https://www.nytimes.com/2022/11/28/technology/twitter-misinformation-experts-hiring.html

Sympathy, and Job Offers, for Twitter’s Misinformation Experts

Seeing false and toxic information as a potentially expensive liability, companies in and outside the tech industry are angling to hire people who can keep it in check.





Tools & Techniques.

https://www.bespacific.com/windows-has-a-new-tool-for-simultaneously-recording-your-screen-and-webcam/

Windows Has a New Tool for Simultaneously Recording Your Screen and Webcam

Lifehacker: “Don’t bother with antiquated screen recording tools like the Xbox game bar or third-party apps. Windows now has a free tool to simultaneously record both your screen and your webcam. Clipchamp video editor is built right in to the latest version of Windows 11 (2o22 update), though anyone running Windows 10 or newer can download it. In fact, you don’t even need to download the tool if you’d rather use the web app. Don’t be intimidated by the fact Clipchamp is a full-blown video editor with templates, effects, transitions, and more. You don’t need to use any of that. Indeed, its actual best feature is somewhat hidden… [h/t The Distant Librarian]



No comments: