Blogs

BROWSE: Most Recent | Popular Tags |

Tags > cryptography

Big data and privacy: an uneasy face-off for government to face

By Andy Oram
March 5, 2014

Thrust into controversy by Edward Snowden’s first revelations last year, President Obama belatedly welcomed a “conversation” about privacy. As cynical as you may feel about US spying, that conversation with the federal government has now begun. In particular, the first …

The technical aspects of privacy

By Andy Oram
March 5, 2014

Thrust into controversy by Edward Snowden’s first revelations last year, President Obama belatedly welcomed a “conversation” about privacy. As cynical as you may feel about US spying, that conversation with the federal government has now begun. In particular, the first …

The RSA/NSA controversy concerns you!

By Jeffrey Carr
February 18, 2014

As a cyber security author and CEO of a security consulting company, I was personally shocked by the RSA’s attitude about the alleged secret payments it received from the NSA as well as its willingness to weaken its BSAFE product; …

Four short links: 5 February 2010

By Nat Torkington
February 5, 2010

The Public Domain Manifesto -- eloquent argument in favour of the public domain. (via BoingBoing) Clear Climate Code -- project to write and maintain software for climate science, with an emphasis on clarity and correctness. What a wonderful way for coders who aren't scientists to contribute to open and better science. (via the interesting OKFN blog) Don't Hash Secrets...

Four short links: 18 January 2010

By Nat Torkington
January 18, 2010

On How Google Wave Surprisingly Changed My Life -- mandated in his small company that non-critical emails be turned into waves instead. Saw: more resolutions to arguments, less rehash of old territory, conversation gained structure and could be referred to afterwards, remote employees able to participate even when timezones prevented real-time. I've been looking for the use case that...

Wayner security flip gets real-life play in Wesabe's Grendel

By Andy Oram
January 13, 2010

A security trick documented by Peter Wayner in the books Beautiful Security and Translucent Databases was also discovered and used by Wesabe.

Four short links: 21 July 2009

By Nat Torkington
July 20, 2009

On Data Reconciliation Strategies and Their Impact on the Web of Data -- For years, I’ve been a fairly vocal advocate for the elegance and scalability of a-posteriori reconciliation via equivalence mappings as a superior mechanism (scale-wise) to a-priori reconciliation efforts… but this started to change very rapidly once I started working for Metaweb and saw first hand how...

The cult of Schneier

By John Viega
January 12, 2009

There's no doubt who the world's leading IT security expert is, Bruce Schneier. Sure, Bruce Schneier may not be a household name on the lips of every man woman and child, but he's certainly far better known than anyone else...


1 to 8 of 8
The Watering Hole