-18°C in Stockholm this morning as I walked to work. A bit nippy. (at Stadshusbron)
Thanks to the “smart” revolution, our appliances, watches, fridges, and televisions have gotten a computer-aided intelligence boost. But where there are computers, there is also copyrighted software, and where there is copyrighted software, there are often software locks. Under Section 1201 of the DMCA, you can’t pick that lock without permission. Even if you have no intention of pirating the software. Even if you just want to modify the programming or repair something you own.
m.nautil.us/issue/31/stress/what-alzheimers-feels-like-from-the-inside, posted 13 Jan by peter in cognition health toread
An investigative reporter chronicles the progression of his own disease.
Antivirus programs need to be able to inspect a lot of data and file types from a variety of sources: the Web, email, the local file system, network shares, USB attached storage devices, etc. They also have a large number of components that implement various layers of protection: drivers for intercepting network traffic, plug-ins that integrate with browsers and email clients, graphical user interfaces, antivirus engines with their subsystems that perform signature-based, behavior-based and cloud-based scanning and more.
This is what security researchers call a very large attack surface, meaning there is a lot of potentially vulnerable code that attackers can reach in a variety of ways. Furthermore, when it comes to antivirus products, much of this code runs with the highest possible privilege, something that researchers argue should be avoided as much as possible.
twitter.com/wastholm/status/685414976455077888, posted 8 Jan by peter
Bloomberg Business, of all places, takes the cake in Star Wars geekery. This must have taken so much time. https://t.co/cPBpnCIlOM
wastholm.tumblr.com/post/136873292197/just-what-every-open-air-pool-on-the-20th-floor, posted 8 Jan by peter
wastholm.tumblr.com/post/136805363182/wintery-train-ride, posted 7 Jan by peter
wastholm.tumblr.com/post/136453388517/main-ingredient-for-todays-lunch, posted 2 Jan by peter
https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/, posted 29 Dec by peter in crapification microsoft privacy security toread transparency
As Green puts it, “Your computer is now only as secure as that database of keys held by Microsoft, which means it may be vulnerable to hackers, foreign governments, and people who can extort Microsoft employees.”