crypto & security (urls)
// this could also apply to crypto and shoddy security products... Why Apple Wants to Bust Your iPhone http://www.nytimes.com/2013/11/03/magazine/why-apple-wants-to-bust-your-iphone.html?partner=rss&emc=rss&_r=1& "Economists have theories about market conditions that encourage planned obsolescence. A company has strong incentives to degrade product durability when it has a lot of market power and when consumers don’t have good substitute products to choose from." The Prison Guard With a Gift for Cracking Gang Codes http://nautil.us/blog/the-prison-guard-with-a-gift-for-cracking-gang-codes ABCDEFGHIJKLM ZYXWVUTSRQPON // what are the security implications of discarded or lost electronics // including the deep context of 'archaeology of electronics' equipment // where stored data could be recovered decades, perhaps centuries later. // such that landfills or other sites may also have a data security dimension Nokia phone lost underwater for 3 months, still works http://timesofindia.indiatimes.com/tech/tech-news/hardware/Nokia-phone-lost-... (preceding urls via Digg.com) // circuit anomalies, potential RNG or entropy relevance Researchers find a way to predict 'dragon kings' in small circuits http://phys.org/news/2013-10-dragon-kings-small-circuits.html // book cover, note typography... Cryptography: The Science of Secret Writing http://www.reanimationlibrary.org/catalog/items/101675 book search https://www.google.com/search?q= Cryptography%3A The Science of Secret Writing ▧ ▣ ▥
participants (1)
-
brian carroll