motz

illegitim

data retention causes a lot of problem, but if your name is fake, doe or stockholm you even get more of it.

old news recovered.

... Link (0 comments) ... Comment


respect

a hacker can figure out a key code by reading the amount of energy a semiconductor chip uses while processing. | technews

Fortt: How did you figure that out? Do you know of any systems that have been compromised using that method?

Kocher: We first discovered the problem in the mid 1990's while studying low-cost, non-invasive ways that keys could be compromised. We then found statistical methods that could identify keys even if the measurement quality is very poor, which made the attack very powerful. Pirates attacking pay TV systems have used power analysis attacks. Companies that make knock-off ink cartridges have also used the approach. Smart cards of all kinds also need to be protected, including those used for payment, mobile telephony, and identity applications. | utilitybelt

power analysis attacks are also known on rfid tacks.

... Link (0 comments) ... Comment


let‘s play tangram

this work will be complete september 2010 | tangram, proposer's information packet

technews quotes an article from National Journal (10/21/06) Vol. 38, No. 42, P. 57; Harris, Shane | subscription

Terrorist Profiling, Version 2.0
The document notes that up to now the guilt-by-association model has been the primary template for the derivation of suspicion scores, and this model has had considerable success in instances where a seed entity in a unknown group is known; "However, in the absence of a known seed entity, how do we score a person if nothing is known about their associates?" It describes Tangram as a system that "takes a systematic view of the [terrorist-detection] process, applying what is now a set of disjointed, cumbersome-to-configure technologies that are difficult for nontechnical users to apply, into a self-configuring, continuously operating intelligence analysis support system."| technews

one day there was a vision darpa called total information awareness (2001) renamed 2003 in terrorism information awareness program | wiki source

Among the shortcomings of terrorist profiling the Tangram document cops to is the difficulty of tracking terrorist behaviors in a constant state of flux, and terrorism researchers' inability to "readily distinguish the absolute scale of normal behaviors" either for terrorists or innocents. |technews

called intelligence value estimation.

... Link (0 comments) ... Comment


Online for 8546 days
Last update: 3/11/23 17:00
status
Youre not logged in ... Login
menu
... Home
... Tags


search
calendar
novembre 2024
dg.dl.dt.dc.dj.dv.ds.
12
3456789
10111213141516
17181920212223
24252627282930
novembre
recent updates
human "The mind is what
the brain does." (margaret boden) Mind As Machine. A History...
by motzes (3/11/23 17:00)
when industry looks old i
have no idea how i came here, but i still...
by motzes (13/12/22 21:10)
holography explained it has been
20 years since i met nils abramson and heard about...
by motzes (20/2/22 10:22)
digital dilemma as seen in
the year 2000 . Intellectual Property in the Information Age...
by motzes (28/1/22 8:56)
anti colonial connectivity "... it
was after all, the early days of Intelsat, when having...
by motzes (16/8/21 11:20)
old stories revisited ... ...
makes one search again, along the lines given. brought me...
by motzes (6/7/21 14:27)
history writing gerade
im ohr: ein interview mit verkühlter stimme. aufnahmedatum: 2016.
by motzes (30/3/20 15:42)
Nice Thanks for uploading this.
It's an amazing window on the early history of interactive...
by Kayla (1/3/20 15:51)
gibberjabber interesting, die eingefangenen bots
werden in ihrer wortwahl aggressiv.
by motzes (26/10/19 20:41)
rätsel Daniel Schwenter, Philosophischen und
Mathematischen Erquickstunden, Dritter Theil, 1653 | https://archive.org/details/bub_gb_bGM_AAAAcAAJ
by motzes (22/10/19 19:06)

RSS Feed

Made with Antville
Powered by
helma object publisher