You are viewing a read-only archive of the Blogs.Harvard network. Learn more.
Skip to content

{ Category Archives } Uncategorized

There Is No Privacy #1: Snooping Browsing History through HTML

Unless you have installed a couple of specific firefox extensions to protect yourself, the owners of any website you visit can tell whether you have visited any other website. It has been known since 2006 that is it possible for any website to query whether you have visited any of a list of other websites […]

Tagged ,

Schneier (wrong) on censorship

Security guru (and potential CISO for the Obama Administration) Bruce Schneier recently blogged about his thoughts on the Internet censorship methods used in the United Arab Emirates: The government of the United Arab Emirates (UAE) pervasively filters Web sites that contain pornography or relate to alcohol and drug use, gay and lesbian issues, or online […]

Narus: Security through Surveillance

In 2006, an AT&T engineer named Mark Klein revealed a secret room inside a major Internet hub that was only accessible to engineers with NSA security clearance. His revelation was written up in the New York Times as part of its larger coverage of NSA wiretapping of domestic communications. Among the documents revealed by Klein […]

Tagged , ,

Best Western Data Breach as Shell Game

On August 26, 2008, the Sunday Herald reported that a hacker had broken into the Best Western reservations system and stolen personal and financial data about eight million Best Western customers, including credit card numbers. According to the report, the thief had installed a virus on the machine of an employee of a local hotel […]

Tagged , ,

Handheld fingerprint readers and the British surveillance state

Hundreds of years ago, with the passage of the Magna Carta, Great Britain took a bold step in outlining basic civil liberties for the common man. Unfortunately, over the past few years, the UK has switched from being a basic rights trend-setter, to a surveillance innovator. What ever happened? Last year, a troubling new law […]

Tagged , ,

CALEA Status

I recently spent a surprisingly difficult afternoon trying to figure out the current status of CALEA (Computer Assistance for Law Enforcement Act), the 1994 law that requires telecommunications companies to build tools into their telephone networks that allow them to respond quickly and fully to law enforcement requests for wiretaps. CALEA is a hugely important […]

Tagged , , , ,