Discover a new way to find and share stories you'll love… Learn about Reading Desk

Post Profile

Inaccurate Copyright Enforcement: Questionable "best" practices and BitTorrent specification flaws

[Today we welcome my Princeton Computer Science colleague Mike Freedman. Mike's research areas include computer systems, network software, and security. He writes a technical blog about these topics at the Princeton S Network Systems -- required reading for serious systems geeks like me. -- Ed Felten] In the past few weeks, Ed has been writing about targeted and inaccurate copyright enforcement.
read more


Windows Flaw Lets Malware Sneak Past Almost All Security Software

Technology : Switched: Computers (4 years ago)

Computers Researchers at Matousec have discovered a new and particularly worrisome flaw in the Windows ecosystem that allows malware to completely bypass security software. Anti-virus software works by standing between applications ... Read Post

Researchers find serious flaw in I2P, an anonymizing layer used in “amnesic” OS Tails

Technology : GigaOM (last week)

The flaw could de-anonymize many users, but it's not a vulnerability in Tails itself, as I2P isn't used by default in the live operating system. Researchers find serious flaw in I2P, an anonymizing layer used in “amnesic” OS Tails o... Read Post

The government wants to wiretap online communications — or in some cases hack them

Technology : Post Tech (6 days ago)

  Law enforcement and intelligence agencies want to be able to wiretap social media, instant message and chat services. But building in ways to wiretap these kinds of communication can lead to less secure systems, say technical expe... Read Post

Copyright © 2011 Regator, LLC