(video)
Archiv der Kategorie: Video
The Joy of Stats
Was macht Google mit gesammelten Daten?
Fearmongering on TV
Unterschätzte Risiken: Alternativmedizin
(youtube)
Unterschätzte Risiken: Sex
Lässt sich die Zukunft berechnen?
Bad move
He’s not as smart as he thinks he is:
(video)
Notice how he keeps increasing and increasing and increasing the apparent value of the laptop he had lost? Instead of talking like this, he should have done two things, backups and disk encryption. It seems that the way he tried to get his computer back didn’t work out.
Think about this
Ähm,
Following rules vs. wise practice
(ted)
The power of vulnerability
(ted)
Achtung, Verkehrsführung geändert!
(youtube)
Security as a classification problem
Security requires that one can tell the bad guys and the good guys¹ apart. Security is thus, at least in part, a classification problem. Different approaches to security use different typs of classifiers. The Israeli profiling described in the video above essentially implements one particular decision tree. There is nothing particularly good or bad about this particular tree compared to others, or to entirely different ways of doing the job. What matters in the first place is that the classifier is either correct—it never confuses good and bad—or that it is at least biased in the right direction—it may misclassify good guys as bad guys², but not bad guys as good guys. A secondary consideration is efficency. The Isreali approach to airport security optimizes efficiency for a particular threat model.
¹ Or other entities. Security classification may work on objects, actions, situations, or really any combination of features that might matter.
² Assuming the enforcement stage of the mechanism does not cause permanent damage to entities classified as bad.
Math Doodling
Werbung
(direkt)
Zuschauen, Entspannen, Nachdenken
10 things that no one has ever said before
Merry Something
Meine teuerste Karte
X3 bringt auf den Punkt, was am neuen Personalausweis blöd ist:
So etwas kommt heraus, wenn man Sicherheit als Funktion und Teilsystem missversteht und diese Funktion unabhängig vom Anwendungskontext realisiert. Wer’s besser machen möchte, muss von den Anwendungen und ihrem Sicherheitsbedarf ausgehen. Dabei können am Ende auch generische Mechanismen herauskommen. Dann aber solche, die ihr Geld wert sind und zu den jeweiligen Problemen passen. Bis das alle begriffen haben, wird meine wichtigste Karte weiterhin eine lange Nummer und das Logo einer Kreditkartenorganisation tragen. Damit kann ich online wie offline was anfangen, und Kosten wie Risiken bleiben bescheiden.
Once upon a time,
… when computer worms were so rare they made it into the news even though they did not do much harm to anybody:
(link)
Kerberos protects your password
(link)