crypto & security (urls)

brian carroll electromagnetize@gmail.com
Wed Oct 30 10:07:23 PDT 2013


// this could also apply to crypto and shoddy security products...

Why Apple Wants to Bust Your iPhone
http://www.nytimes.com/2013/11/03/magazine/why-apple-wants-to-bust-your-iphone.html?partner=rss&emc=rss&_r=1&

"Economists have theories about market conditions that encourage
planned obsolescence. A company has strong incentives to degrade
product durability when it has a lot of market power and when
consumers don’t have good substitute products to choose from."


The Prison Guard With a Gift for Cracking Gang Codes
http://nautil.us/blog/the-prison-guard-with-a-gift-for-cracking-gang-codes

ABCDEFGHIJKLM
ZYXWVUTSRQPON


//  what are the security implications of discarded or lost electronics
//  including the deep context of 'archaeology of electronics' equipment
//  where stored data could be recovered decades, perhaps centuries later.
//  such that landfills or other sites may also have a data security dimension

Nokia phone lost underwater for 3 months, still works
http://timesofindia.indiatimes.com/tech/tech-news/hardware/Nokia-phone-lost-underwater-for-3-months-still-works/articleshow/24879787.cms

(preceding urls via Digg.com)


// circuit anomalies, potential RNG or entropy relevance

Researchers find a way to predict 'dragon kings' in small circuits
http://phys.org/news/2013-10-dragon-kings-small-circuits.html

// book cover, note typography...

Cryptography: The Science of Secret Writing
http://www.reanimationlibrary.org/catalog/items/101675

book search
https://www.google.com/search?q= Cryptography%3A The Science of Secret Writing

▧ ▣ ▥




More information about the cypherpunks mailing list