The MacValley blog


Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.


Tom Briant

The MacValley blog

Editor: Tom Briant


Click here to email Tom

Click here for Tom's profile



To search the blog posts please use the box below

Sunday, October 6, 2013

Sunday Morning and it's time for Senior Correspondent Arnold Woodworth's Roundup

Why Investors Hate Apple -- and Are Dead Wrong





Apple is sitting on 10% of all US corporate cash





the first interesting search engine since Google

One of Blippex's key selling points is that Kossatz and Baeck are fanatical about privacy.

Google's algorithm -- called PageRank -- evaluates the relevance of a site according to how many other pages on the web link to it.  Blippex's algorithm, called DwellRank, decides relevance based on how long users spend on a site and how many times Blippex users have visited it.

The world's most user-ignorant search engine

Kossatz and Baeck are continually thinking about how to make Blippex know even less about its users. If Blippex doesn't have a piece of data, it can't ever be stolen by hackers or subpoenaed by a government. To that end, they've made Blippex's browser plugin open-source, so that anyone can examine its code and verify that it's not grabbing information the team says it isn't.





Your body is the next frontier in cybercrime

In-body medical devices are the next cyber-hacking frontier.





How a Purse Snatching Led to the Legal Justification for NSA Domestic Spying





EFF Gives Expert Testimony on NSA Spying in Challenge to British Surveillance Program

The pervasiveness of US surveillance on people who are not “US persons” makes standing up for these rights more important than ever. EFF is delighted to assist our colleagues and our European members in this fight.





Security Expert: “We Have To Assume That The NSA Has EVERYONE Who Uses Electronic Communications Under CONSTANT Surveillance”





Everything you need to know about the NSA and Tor in one FAQ





NSA attempted to de-anonymize Tor, with little success

With manual analysis they can de-anonymize a very small fraction of Tor users.





How The NSA Pulls Off Man-In-The-Middle Attacks: With Help From The Telcos

To trick targets into visiting a FoxAcid server, the NSA relies on its secret partnerships with US telecoms companies. As part of the Turmoil system, the NSA places secret servers, codenamed Quantum, at key places on the internet backbone. This placement ensures that they can react faster than other websites can. By exploiting that speed difference, these servers can impersonate a visited website to the target before the legitimate website can respond, thereby tricking the target's browser to visit a Foxacid server.

In the academic literature, these are called "man-on-the-middle" attacks.





California Governor Jerry Brown signed a law on Thursday to give journalists in the state five days' notice before government agencies serve subpoenas on their records held by third parties, such as phone companies and internet service providers.

The California law comes after two cases earlier this year that sparked debate about whether the U.S. Justice Department had infringed on the free-speech rights of journalists in aggressive probes of government leaks.





NSA chief’s admission of misleading numbers adds to Obama administration blunders

the chief of the National Security Agency admitted that officials put out numbers that vastly overstated the counterterrorism successes of the government’s warrantless bulk collection of all Americans’ phone records.

No comments:

Post a Comment



Blog Archive