Administrator
|
I've mentioned turning off 3-rd party cookies. Here Bruce Schneier, author of the cyber-math texts and several security books (Secrets and Lies my fav so far) discusses just how pervasive tracking is.
Reading between the lines, I believe 3-rd party cookies are part of this particular game, although Bruce says cookies aren't the only culprit. But looking at the 3rd party cookie alerts I get on every page now has me wondering.
Anyway, another good read from BS. (Oops?!)
http://us.cnn.com/2013/03/16/opinion/schneier-internet-surveillance/index.html -- Owen ============================================================ FRIAM Applied Complexity Group listserv Meets Fridays 9a-11:30 at cafe at St. John's College to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com |
http://arstechnica.com/security/2013/03/new-attacks-on-ssl-decrypt-authentication-cookies/
Gmail's / Google's single factor authentication was facing problems all of yesterday. http://ibnlive.in.com/news/google-plus-gmail-suffer-temporary-disruption/373250-11.html
On Mon, Mar 18, 2013 at 9:39 AM, Owen Densmore <[hidden email]> wrote: I've mentioned turning off 3-rd party cookies. Here Bruce Schneier, author of the cyber-math texts and several security books (Secrets and Lies my fav so far) discusses just how pervasive tracking is. ============================================================ FRIAM Applied Complexity Group listserv Meets Fridays 9a-11:30 at cafe at St. John's College to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com |
Administrator
|
Nice links Sarbajit.
It wasn't clear if it was single-factor or "single sign on" i.e. a single login into the entire Google ecology of services via the same name/password pair. The latter could be internal server issues.
But the RC4 weakness is seriously threatening. This email will use it.
What isn't clear to me is whether Gmail stream cypher is still secure via two-factor authentication. I suspect it is.
-- Owen
On Sun, Mar 17, 2013 at 10:45 PM, Sarbajit Roy <[hidden email]> wrote: http://arstechnica.com/security/2013/03/new-attacks-on-ssl-decrypt-authentication-cookies/ ============================================================ FRIAM Applied Complexity Group listserv Meets Fridays 9a-11:30 at cafe at St. John's College to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com |
In reply to this post by Owen Densmore
I use the Ghostery plugin with Firefox at home and work to control "3PES" as they call them. Between that, NoScript, and Request Policy, I feel relatively secure. Of course, if I want to see web-pages the way the authors intended, I have to do a lot of NoScript and Request Policy exceptions. Some sites just get lumped into untrusted under NoScript - the first time I see a web-page wanting to run a script from an unfamiliar site, I do a quick search. If the new site touts ads, social media, tracking, SEO, or most of the other current web stuff, I ban it. For the most part, once I have things set up the sites I usually visit come up relatively clean.
Ray Parks Consilient Heuristician/IDART Program Manager V: 505-844-4024 M: 505-238-9359 P: 505-951-6084 NIPR: [hidden email] SIPR: [hidden email] (send NIPR reminder) JWICS: [hidden email] (send NIPR reminder) On Mar 17, 2013, at 10:09 PM, Owen Densmore wrote: I've mentioned turning off 3-rd party cookies. Here Bruce Schneier, author of the cyber-math texts and several security books (Secrets and Lies my fav so far) discusses just how pervasive tracking is. ============================================================ FRIAM Applied Complexity Group listserv Meets Fridays 9a-11:30 at cafe at St. John's College to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com smime.p7s (4K) Download Attachment |
Free forum by Nabble | Edit this page |