Zero Width Characters
Another bit of miscellany, this one shows how you can use zero width characters to tag/fingerprint data. Reminds me of the Canary Trap (if you’re a Clancy fan).
Read more "Zero Width Characters"Another bit of miscellany, this one shows how you can use zero width characters to tag/fingerprint data. Reminds me of the Canary Trap (if you’re a Clancy fan).
Read more "Zero Width Characters"Two weeks ago on Saturday morning I got a push notification on my phone from American Express that a potential fraudulent use of my card had been attempted and denied 14 seconds earlier. I had loaded the phone app just to try it out and I think I had used it once, so it was […]
Read more "Someone Stole My Credit Card Number"As someone who lives the data world I know that we work hard at protecting certain types of data more than others. PII, PCI, HIPPA, they all get extra attention, or perhaps the “other” data just gets less attention. We think of the worst case as a breach that leads to millions of credit cards […]
Read more "The Sony Breach Lesson For SQL Professionals (And Everyone Else Too)"Last week Ebay announced that some accounts were compromised, including passwords with as yet unstated encryption. Those who aren’t tech savvy here “encryption” and think “well, then I’m ok”. Maybe yes, may no. The problem is that if they break the encryption they will immediately try to plug that password into hundreds of sites. The […]
Read more "It’s Time to End Password Reuse"I recently ran across the warrant canary FAQ from the Electronic Frontier Foundation (EFF). The concept is simple – put up a statement now saying that so far you have not been compelled by a secret order to turn over data to the government. Wikipedia has an entry for it. The example I read about […]
Read more "Warrant Canaries & Transparency"