Here at Chad’s News, we’ve previously discussed the issues involved in securely wiping files stored on a solid-state drive (SSD). The linked article summarizes another, more recent study on the topic that pretty much says the same thing: the only way to ensure that you’ve securely wiped an SSD is to physically destroy the hard drive. Other methods may work, but they are not universally reliable.
The US Navy will be deploying a laser weapon system later this year, a la Star Wars, and has plans to deploy a railgun within the next two years. Railgun systems have been available in laboratory settings for a while now, and the real challenge has been meeting their huge power requirements on a seagoing vessel—the ship hosting the railgun, for example, will be able to generate 78 megawatts of electricity, enough to power a medium-sized city.
Security through obscurity, while helpful, is not sufficient to reliably safeguard your secrets from a determined attacker. That may be changing, however, as the linked article describes a new type of computer code obfuscation that can’t be reverse engineered. This would allow encryption programs and keys to be obfuscated, producing a new type of reliable encryption that (I’m assuming) can’t be broken by quantum computers.
This all goes back to a fundamental problem with protecting your proprietary computer code: the computer that it’s running on has to be able to understand it. In the early ’80s when personal computers were still fairly new, there were a bunch of anti-copying schemes for commercial software that tried to make it impossible to copy the floppy disks. Most of them were easily circumvented by skilled hackers. I remember a peripheral device for hackers that, when you pushed a button, would create a copy of whatever was in memory. So even if you couldn’t duplicate the disk, you could make a copy of the program from memory and save that to a non-protected disk. It was a losing battle, and most companies eventually abandoned these types of copy protection schemes.
But that’s all changed. The new method described in the linked article uses “indistinguishability obfuscation” to create computer code that’s too complex to be reverse-engineered, yet when run on a computer will produce the proper results. This is accomplished by including elements that appear random and add complexity but are carefully chosen to cancel themselves out.
As with the popular public key encryption, this method of obfuscation is tied to a difficult math problem. From the article: “This obfuscation scheme is unbreakable, the team showed, provided that a certain newfangled problem about lattices is as hard to solve as the team thinks it is.”
Obfuscation is not yet completely proven, but it shows great promise. And if it stands up after further research then we’ll probably see it go mainstream for at least cryptography and perhaps more.
Net neutrality has been a hot topic in the internet world, but many people have no idea why it’s important. The linked article gives the best definition that I’ve seen. Essentially, without net neutrality, your ISP and other network providers can play god in regards to the content you receive. They can block certain sites or give preferential treatment to sites. They can demand that a content provider (e.g., Google) pay them in order to not have their content receive degraded performance. This is not hypothetical—I remember reading about how the CEO of a major network provider wanted to charge companies like Google for the traffic coming over its system, even though the network provider’s subscribers were already paying for that access. He saw it as a source of additional income and was upset that Google didn’t have to pay to use the company’s network.
This goes against everything the internet stands for, of course, so the FCC instituted a regulation enforcing net neutrality. The FCC, however, doesn’t have the authority to make that kind of regulation, and the courts recently struck it down. Congress could make a law enforcing net neutrality, but somewhere along the line this topic became a partisan political issue. Not sure why that’s the case, but the end result is that congress is unlikely to pass any legislation in the foreseeable future.
Only time will tell what the major ISPs and network providers do with their new freedom, but I think it’s going to be ugly.
How concerned are you about your privacy in regards to companies you do business with? The first linked article describes (in length) how corporations are using data collection and analytics to learn private details about their customers, with a particular emphasis on Target identifying which of its customers are pregnant and sending targeted coupons to those women. The second article highlights one of the more interesting situations that Target encountered, where a father found out that his 16-year old daughter was pregnant only after she received baby-related coupons from the company.
I personally have no problem with companies collecting my data and using it to send me useful coupons or to market stuff they think I want to buy. King Soopers, my grocery store, sends me targeted coupons all the time—and it saves me a good deal of money. But there are a lot of people out there who find this type of thing spooky and a bit frightening. It’s all perfectly legal, but that glimpse into the world of big data analytics is unsettling to many. The third linked article lists additional areas where some institution knows more about you than you may want them to know.
Did you know that when you purchase an airline ticket can have an impact on the price? Buying tickets on Tuesdays or over the weekend can get you a better deal. Also, purchasing them seven weeks before the trip will usually get you the best fare.
The author of the linked article accumulated a database of hacked PINs and numeric passwords, then analyzed it to see what patterns emerged. Here are some of the highlights:
- 20% of all PINs use just five different numbers: 1234, 1111, 0000, 1212, and 7777.
- The fourth most popular seven-digit password is 8675309. (Wait for it…)
- Using a year in the form 19XX is a bad idea.
- The least used PIN is 8068.
- Including 007, 420, and 69 may seem like a neat idea, but they turn out to be quite common.
- Numbers made from drawing lines or patterns on the keypad are also popular.
The U.S. Court of Appeals for the 9th Circuit confirmed a lower court’s ruling that Dish Network’s Hopper, a DVR that automatically skips commercials when playing back recorded content, does not violate copyright law. Whether or not the decision is appealed, this case will produce a landmark ruling.
Business Insider has an article listing the problems with Google Glass, based on reviews by others. Most of these issues can be fixed, but the author was unable to find anyone with a compelling reason to actually use Google Glass—which may be the primary factor in whether or not the technology is adopted by the general public.
Some Calvin and Hobbes fans have made a fake trailer for a movie where Calvin is now an adult and his imagination is even more powerful—but it’s turning darker. And all I can say is “Wow.”
ISS Commander Chris Hadfield was asked by high school students to demonstrate what happens when you wring out a washcloth in zero gravity. The result is pretty cool and is all about surface tension!