For my Ethical Hacking students.
The Obama administration has apparently decided
not to support exceptional access proposals that would provide law
enforcement with the means to access data on iPhones and other
personal devices.
As I argued
previously on Just Security, instead of pursuing
exceptional access, policymakers should seek to build a durable legal
structure that would provide the FBI with the authority, under
appropriate oversight, to exploit software vulnerabilities. Because
these vulnerabilities already exist, lawful hacking, as this is
sometimes called, can help get law enforcement what it needs without
introducing the additional security risks associated with exceptional
access. It is worth revisiting this issue now that the
administration has seemingly reached a decision regarding its
encryption policy.
The law scholars I have subsequently spoken with
disagree about whether the legal structure exists today to support
lawful hacking. Although there are a few excellent treatments of the
subject (for example, here
and here),
the issue seems to me to be under-examined.
I keep thinking about all those eggs in one
basket. Perhaps redundancy isn't such a bad thing? This also points
to some high value targets in the coming CyberWar...
Dozens of
Major Websites Crash All at Once
Dozens of major websites including Netflix, Uber
and the BBC went down simultaneously on Thursday in some areas of the
United States, but were soon up again in most cases.
The cause of the crashes remained unclear, but
some appeared connected to trouble at a cloud service relied on by
companies, although that did not stop the social media rumor and
conspiracy mill from going into overdrive.
… Netflix
spokesman Joris Evers told AFP that the outage was the result of
"technical issues" at an UltraDNS cloud service provided by
Neustar and affected mostly US subscribers.
… Cloud-based
DNS services essentially route traffic to websites.
"It's
kind of a road map," said Silicon Valley analyst Rob Enderle of
Enderle Group.
"The
roads are still in place, but if the map goes away nobody knows where
to go."
What makes good Computer Security? How controlled
(controllable?) is an “authorized” user?
Orin Kerr writes:
Next week, a panel of the Ninth Circuit Court of Appeals (Thomas, Reinhardt, and McKeown) will hear oral argument in the second round of United States v. Nosal. This time around, the main question in the case is whether and when accessing an account using a shared password is an unauthorized access under the Computer Fraud and Abuse Act. A second question is how to interpret Nosal I, the en banc decision from 2012, and in particular whether it required circumventing a technical access barrier.
Read more on The
Volokh Conspiracy.
[A draft
worth reading:
My forthcoming article, Norms
of Computer Trespass, offers some thoughts on how to deal
with the shared password problem.
This could be useful!
Skype Goes
Universal, Lets Anyone Join A Chat Even Without A Skype Account
… In a blog post, the Skype team has announced
that users can now share links to their Skype chats with other people
without requiring them to create or open a Skype account.
… The new feature works by letting users
generate a unique link for a certain chat by clicking the +New
button. This will create the link that can then be shared to other
people through any means. On the receiving side, users who are
invited to a chat can simply click on the link to go to the Skype for
Web interface, enter their name and start chatting away.
I like WolframAlpha for Math. But it does other
things too.
16 Searches
You Can Run on Wolfram Alpha That Don’t Work on Google
by Sabrina
I. Pacifici on Oct 15, 2015
“There are all kinds of different ways to use
Wolfram
Alpha, and it’s often a better idea to load up the
computational knowledge engine rather than your search portal of
choice. Here
are 16 of the most useful queries that Wolfram Alpha can handle
but leave Google stumped…”
Some “flipped” thinking: Is there a right to
be remembered?
Commentary
– the web is not a library, repository, a place
by Sabrina
I. Pacifici on Oct 15, 2015
The Atlantic – If
a Pulitzer-finalist 34-part series of investigative journalism can
vanish from the web, anything can, by Adrienne LaFrance, October
14, 2015: “If a sprawling Pulitzer Prize-nominated feature in one
of the nation’s oldest newspapers can disappear from the web,
anything can. “There are
now no passive means of preserving digital information,”
said Abby Rumsey, a writer and digital historian. In
other words if you want to save something online, you have to decide
to save it. Ephemerality is built into the very
architecture of the web, which was intended to be a messaging system,
not a library. Culturally, though, the functionality of the web has
changed. The Internet is now considered a great oracle, a place
where information lives and knowledge is stitched together. And yet
there are no robust mechanisms for libraries and museums to acquire,
and thus preserve, digital collections. The world’s largest
library, the Library of Congress, is in
the midst of reinventing the way it catalogues resources in the
first place—an attempt to bridge existing systems to a more dynamic
data environment. But that process is only beginning… Yet today’s
web is more at-risk than the iterations that preceded it. The
serving environments are now more complex, and the volume of data
involved is astonishing. In 1994, there were fewer
than 3,000 websites online [nhttp://www.llrx.comote
– my site LLRX went online in 1996 and continues today]. By 2014,
there were more
than 1 billion…”
I be two grate-full. It shell make my students
gooder.
9 Websites
That Solve Dumb English Grammar Mistakes Instantly
“Skills, competencies and mindsets?” Sounds
like my students could benefit form this report.
Building
Expertise to Support Digital Scholarship: A Global Perspective
by Sabrina
I. Pacifici on Oct 15, 2015
Building Expertise to Support Digital Scholarship:
A Global Perspective by Vivian Lewis, Lisa Spiro, Xuemao Wang,
and Jon E. Cawthorne October 2015. 50 pp. ISBN
978-1-932326-51-2 CLIR pub 168
PDF
Download of Full Report. This is a web-only report—it
is not available in print. “This report sheds light on the
expertise required to support a robust and sustainable digital
scholarship (DS) program. It focuses first on defining and
describing the key domain knowledge, skills, competencies, and
mindsets at some of the world’s most prominent digital scholarship
programs. It then identifies the main strategies used to build this
expertise, both formally and informally. The work is set in a global
context, examining leading digital scholarship organizations in
China, India, Taiwan, the United Kingdom, Germany, Mexico, Canada,
and the United States. The report provides recommendations to help
those currently involved in or considering embarking on a digital
scholarship program.”
No comments:
Post a Comment