Apple Vs. FBI, Take Two

Well, it is now old news that the FBI has found a way to retrieve data from the iPhone of deceased terrorist Syed Farook without the cooperation of Apple. It's not surprising that the FBI succeeded here. All security can be breached. It's just a question of how much effort people are willing to expend for a given result, and what the repercussions are if you get caught. In this case, there w... » read more

Oh, The Hypocrisy

It's almost impossible to find anyone hasn’t heard about the privacy case chest-thumping going on between Apple and the FBI, as well as a few other federal entities. And by now the interview with Tim Cook and David Muir is quite public, as well. So how come, all of a sudden, Apple, Microsoft (although Bill Gates did come out on the government side) Google, Yahoo, Facebook, and countless ot... » read more

IoE Things Are Spying On Us

Special inaudible sounds are being embedded in Web pages and television commercials. In India, a company called SilverPush embeds short, ultrasonic sounds into television commercials and Web pages. Not only that, complementary software is being snuck onto computers, tablets, and smartphones. This software will pick up these “inaudible” signals and, via cookies, send what it learns back t... » read more

Scare Of The Month: The Breach At Juniper

Details are sketchy, but it was definitely a back door hack of Juniper. That almost always points in the direction of an inside job. So far, no one quite knows how exactly the hack was accomplished. But what scares me is that, supposedly, this code has been in the system for three years already. Drilling down a bit, it turns out there was more than one back door. One of them allowed ... » read more

Scare Of The Month: Whitebox Cryptography

A debate has been raging for some time about whether hardware is more secure than software. This story should provide plenty of fuel for debate. A few years ago, something called White Box Cryptography (WBC) was developed. This is a rather novel approach that attempts to implement cryptography algorithms in software, rather than hardware. The idea is to keep the cryptographic assets secure a... » read more

Things You Can Control While Sleeping

Because the IoE is just a rather vague and fluid concept right now, it is easy for just about anyone to define all or part of it in almost any fashion they desire. But some things do have a basis. For example, if you take a look at the consumer trends, as has been the case for years, you can glimpse what is happening in various segments throughout the IoE and, to some degree, where they are hea... » read more

The Danger Of Denial

For years now, my diehard Mac-lover friends and this diehard PC fan have bantered back and forth about the superiority of one processor over the other. When Apple switched to the Intel platform in the late 2000s the argument went moot. I was right, they were wrong. PC’s were the best computers. Since then, the arguments about which platform is better have died off. They both do the job, a... » read more

The Growing Price Of A Click

I have been staring at computer screens for a long time. I remember when AOL was the biggest thing to come along since 16-bit computing. I have always been an anti-spam/junk advocate. With snail mail, I could just pitch it. With radio and TV ads, I could turn down the volume or switch channels. But it got impractical to walk away from my computer every time an ad popped up on a new page. So ... » read more

Who’s Driving That Car?

In my May blog, I had written a short on the incident where supposedly, airliner's computer system had been compromised by a wayward security researcher from One World Labs. Chris Roberts was his name. Anyway, if you didn’t read about it, the long and short of it is that he hacked a simulator and not a jet. Nevertheless, the issues that raises have implications across the entire transportatio... » read more

Let’s Talk Open Source

Of late I have been hearing some rumblings about open source for the IoE. The sad part is that there is still talk about anything else. Even though the IoE remains a dream to many, the shrewd marketers already are scheming on how to make their product the one that leads that pack, and many see proprietary source code as a way to differentiate themselves. I can see that in any number of appli... » read more

← Older posts