Worth Reading: Checklists

1 November 2017

Thirty-six seconds after launch, lightning struck the Apollo 12 and its six million pounds of high explosive fuel. The instruments blacked out. Twenty-two seconds later lightning struck again. What few instruments remained started flashing red failure lights. The “you’re about to die” alarm started blaring. Over the radio the crew heard the voice of John…

Worth Reading: Low Earth Satellite Internet Access

1 November 2017

Satellites are now cheaper, smaller and lighter. OneWeb and their manufacturing partner Airbus say automation and re-design will enable them to manufacture three satellites per day at a cost of less than $1 million each and launch cost per satellite will be low since they are small and light. In a talk at the opening…

Worth Reading: Hack it back is a bad idea

31 October 2017

If there were a prize for the worst cybersecurity policy idea that just won’t die, it would have to go to “hacking back,” or making it legal for people to attack the computers that are attacking them. This idea has been around for years, which means that for years, people have been warning that this…

Worth Reading: The Look It Up Fallacy

31 October 2017

The first problem behind the “Look it Up” fallacy has to do with definitions of words. Most words have more than one definition, and even when they don’t have more than one main definition, there are usually several different, related meanings. Only a knowledge of the context in which the words appears will allow you…

Worth Reading: The calm before the IoT Storm (Reaper)

30 October 2017

It’s been just over a year since the world witnessed some of the world’s top online Web sites being taken down for much of the day by “Mirai,” a zombie malware strain that enslaved “Internet of Things” (IoT) devices such as wireless routers, security cameras and digital video recorders for use in large-scale online attacks.…

Worth Reading: An observatory for path transparency measurement

30 October 2017

Though the end-to-end principle and the four-layer TCP/IP architecture suggest that what happens above the IPv4 or IPv6 header isn’t any of the network’s business, the widespread deployment of firewalls, network address translators, proxies, and other middleboxes at layers four and seven mean that, in practice, TCP usually works, UDP usually works, and for everything…

Worth Reading: Raw sockets in IPv6

27 October 2017

As part of a measurement experiment, we wanted an implementation of an IPv6 UDP server and a TCP server that generated fragmented IPv6 packets. However, as an added condition, we wanted the application to directly control the packet fragmentation function. The conventional standard socket interface masks any visibility to the underlying packet transactions, and therefore…

Humor for the Day: Facebook simplifies its privacy policy

26 October 2017

“We wanted to be more forthright with our users,” Facebook CEO Mark Zuckerberg told reporters. “We could give you this boring tome of legalese, or we could simply put it in terms everyone can understand. —The Babylon Bee

Worth Reading: 4 Tips to Fight Propoganda

25 October 2017

Disturbingly, both men confirmed the totality of propaganda in our society. And they did that many, many decades ago and well before the internet, social media, cable TV, or data mining. By 2017, many generations have been raised from infancy immersed in corporate, political, and ideological propaganda. Your grandparents were victims of propaganda, your parents…

Worth Reading: TLS and Data Center Monitoring

24 October 2017

Over the course of four years, Transport Layer Security (TLS) 1.3 has been designed to be more secure in order to prevent the interception of sessions over the Internet. It has a more secure key exchange, based on the Elliptic Curve Diffie-Hellman algorithm, formally deprecating the use of RSA static keys to ensure forward secrecy…