warrenellis + security   9

Core77 / Clever Bulletproofing System Based on Marbles and Legos
"Their latest solution, Soft Armour, is both fascinating and sadly needed. It's a system of bulletproofing structures, and potentially vehicles, by means of modular boxes that are filled with what look like ceramic marbles. Check out how it works:"
tech  war  security 
february 2015 by warrenellis
Android security mystery - 'fake’ cellphone towers found in U.S.
"Seventeen mysterious cellphone towers have been found in America which look like ordinary towers, and can only be identified by a heavily customized handset built for Android security – but have a much more malicious purpose, according to Popular Science."
spook  security  crime  comms 
september 2014 by warrenellis
Immunicity - Simple Censorship Circumvention
"Once you configure your browser, requests to blocked websites will be seamlessly routed via the Immunicity cloud to get unblocked. All other requests will go directly to their destination, without being routed through our servers."
security  net  comms 
february 2014 by warrenellis
Science | From AAAS
In other fields, scientists are learning that they may give away sensitive data without being aware they'd let it slip. Archaeologists have posted pictures of new finds on websites only to discover that savvy thieves have tapped metadata digitally attached to images to discover location information—and then looted the site. Conservation biologists often refrain from saying exactly where they've spotted a rare species, for fear an overzealous collector or landowner will hunt it down. Genome researchers and social scientists have been stung by computer wizards who have shown that they can take databases that supposedly have been stripped of information allowing the identification of individuals and "re-identify" study participants, violating privacy rules. In theory, such techniques could reveal a trove of problematic information, such as embarrassing Web surfing habits, stigmatizing mental health issues, or genetic traits that could affect employment or insurance.
As plant biologist Rodrigo Gutiérrez of the Catholic University of Chile in Santiago puts it: "We are gaining the capacity to generate lots of sensitive information, but not necessarily the capacity to handle it appropriately."
security  talk 
october 2013 by warrenellis
Researcher's Serial Port Scans Find More Than 100,000 Hackable Devices, Including Traffic Lights And Fuel Pumps - Forbes
"You probably remember serial ports as the ancient nine-pin plugs you once used to hook up your mouse or joystick to your computer in the pre-USB dark ages. But tracking down devices that still use serial port connections isn’t so hard, it seems. In fact, according to H.D. Moore, any hacker can find–and tamper with–more than 100,000 of them over the Internet, including critical systems ranging from traffic lights to fuel pumps to building heating and cooling systems to retail point-of-sale devices."
tech  security 
april 2013 by warrenellis
My speech to the IAAC | Ben Hammersley's Dangerous Precedent
"I’m simply now expecting people to give me their data to improve my life. The freeing of public data over the past ten years has been driven by geeks, it’s true, but their arguments were merely foreshadowing a general shift in the mindset of the population at large...We expect everything. And we expect it on our own terms."
security  net 
september 2011 by warrenellis
Beijing to track all mobile phone users' movements | China News Watch | Latest Hong Kong, China & World News | SCMP.com
"Every Beijing mobile phone user will be tracked through the use of the latest global positioning technology, the municipal government announced on Tuesday."
comms  security  war  pol 
march 2011 by warrenellis

Copy this bookmark: