posted 31 Jan by peter
Top10VPN, for example, recently took a closer look at 150 VPN apps being offered in the Android marketplace and found that 90% of them violated consumer privacy in some fashion, either by the inclusion of DNS leaks, a failure to adequately secure and store user data, or by embedding malware:
"Simon Migliano, the head of this research, reports that at over 38 VPN apps tested positive for DNS leaks, exposing private data to hundreds of insecure links. Also, over 27 VPN apps were flagged as potential sources of malware when tested by VirusTotal.
Apart from this, the research also found intrusive permissions in over 99 apps. These permissions included user location, device information, use of the microphone, camera access and more."
https://www.nytimes.com/2019/01/17/arts/music/stradivarius-sound-bank-recording-cremona.html, posted 19 Jan by peter in art audio history music
On Jan. 7, the police cordoned off the streets. The auditorium’s ventilation and elevators were turned off. Every light bulb in the concert hall was unscrewed to eliminate a faint buzzing sound.
Upstairs in the museum, Mr. Cacciatori put on a pair of velvet gloves and took a 1615 Amati viola from its glass display case. He inspected it thoroughly, and then a security guard escorted him and the instrument down two flight of stairs to the auditorium.
The curator handed the instrument to Wim Janssen, a Dutch viola player, who walked to the center of the stage.
So what most likely happened is that we have scientists describing the progression of climate change. They give the uncertainty range and the press decides to only mention the lower boundary of this range. Then they somehow turn it into a deadline, put this in many headlines and never tell their readers where the number comes from. This made #12years a somewhat viral political meme. Chinese whispers of the worst kind. Journalists please listen to Peter Hadfield: check the source.
posted 31 Dec by peter
This article explains Reed-Solomon erasure codes and the problems they solve in gory detail, with the aim of providing enough background to understand how the PAR1 and PAR2 file formats work, the details of which will be covered in future articles.
I’m assuming that the reader is familiar with programming, but has not had much exposure to coding theory or linear algebra. Thus, I’ll review the basics and treat the results we need as a “black box”, stating them and moving on. However, I’ll give self-contained proofs of those results in a companion article.
So let’s start with the problem we’re trying to solve! Let’s say you have n files of roughly the same size, and you want to guard against m of them being lost or corrupted. To do so, you generate m parity files ahead of time, and if in the future you lose up to m of the data files, you can use an equal number of parity files to recover the lost data files.
posted 16 Dec by peter
We need to have a lot of difficult conversations in order to resolve the issues we are facing as a society, and the only way these conversations will be productive and enduring is if we all can agree on the facts. Right now, with Americans believing more than 40 percent of the news they see is fake, we aren’t quite there as a society, but that doesn’t mean we can’t be. The internet is an amazing tool, but to use it most effectively we have to embrace its benefits while also understanding the ways in which it makes us vulnerable. If students are still learning dated practices such as cursive writing in school, shouldn’t they be learning how to navigate and consume the internet responsibly as well?
Much misinformation and many falsehoods related to politics circulate online. This paper investigates how youth judge the accuracy of truth claims tied to controversial public issues. In an experiment embedded within a nationally representative survey of youth ages 15-27 (N=2,101), we examined factors that influenced youth judgements regarding the accuracy of the content. Consistent with research on motivated reasoning, youth assessments depended on a) the alignment of the claim with their prior policy position and, to a lesser extent, on b) whether the post included an inaccurate statement. However, and most importantly, among those participants who reported the most media literacy learning experiences, there was a large, statistically significant difference in ratings of accuracy between those exposed to a post that employed misinformation and those who saw an evidence-based post. Implications for educators and policymakers are discussed.
https://www.haproxy.com/blog/application-layer-ddos-attack-protection-with-haproxy/, posted 27 Nov by peter in howto networking performance toread
In this blog post, we’ll demonstrate how the HAProxy load balancer protects you from application-layer DDoS attacks that could, otherwise, render your web application dead in the water, unreachable by ordinary users. In particular, we’ll discuss HTTP floods. An HTTP flood operates at the application layer and entails being immersed with web requests, wherein the attacker hopes to overwhelm your application’s capacity to respond.