crypto & security (urls)
brian carroll
electromagnetize at gmail.com
Wed Oct 30 10:07:23 PDT 2013
// this could also apply to crypto and shoddy security products...
Why Apple Wants to Bust Your iPhone
http://www.nytimes.com/2013/11/03/magazine/why-apple-wants-to-bust-your-iphone.html?partner=rss&emc=rss&_r=1&
"Economists have theories about market conditions that encourage
planned obsolescence. A company has strong incentives to degrade
product durability when it has a lot of market power and when
consumers don’t have good substitute products to choose from."
The Prison Guard With a Gift for Cracking Gang Codes
http://nautil.us/blog/the-prison-guard-with-a-gift-for-cracking-gang-codes
ABCDEFGHIJKLM
ZYXWVUTSRQPON
// what are the security implications of discarded or lost electronics
// including the deep context of 'archaeology of electronics' equipment
// where stored data could be recovered decades, perhaps centuries later.
// such that landfills or other sites may also have a data security dimension
Nokia phone lost underwater for 3 months, still works
http://timesofindia.indiatimes.com/tech/tech-news/hardware/Nokia-phone-lost-underwater-for-3-months-still-works/articleshow/24879787.cms
(preceding urls via Digg.com)
// circuit anomalies, potential RNG or entropy relevance
Researchers find a way to predict 'dragon kings' in small circuits
http://phys.org/news/2013-10-dragon-kings-small-circuits.html
// book cover, note typography...
Cryptography: The Science of Secret Writing
http://www.reanimationlibrary.org/catalog/items/101675
book search
https://www.google.com/search?q= Cryptography%3A The Science of Secret Writing
▧ ▣ ▥
More information about the Testlist
mailing list