I am amused at the "State-Sponsored Malware" segment - the two papers cover the two extremes of the range of activities.
One up and coming area that the course covers peripherally but not directly is the new/old vulnerabilities in mobile apps. When Tim B-L invented the World-Wide Web, his model for use was that every user would have a web-page, their home page, and users would visit each others' pages - a peer-to-peer model in which each participant operated a web-server as well as a web-browser. As the WWW was commercialized, it morphed into a loose client-server model in which web-servers are the province of those with content and resources while most users are consumers using a browser. The architecture of smartphones and apps is such that it is a return to the original model but with a twist. Almost all apps on smartphones are both a web-browser-client and a web-server. This means that all of the vulnerabilities and mistakes that still exist throughout the WWW web-servers are being reproduced in smartphone apps. As far as privacy is concerned - I'm surprised that there is no discussion of "big data" and how to attack it to protect one's privacy. Ray Parks Consilient Heuristician/IDART Program Manager V: 505-844-4024 M: 505-238-9359 P: 505-951-6084 NIPR: rcpa...@sandia.gov SIPR: rcpar...@sandia.doe.sgov.gov (send NIPR reminder) JWICS: dopa...@doe.ic.gov (send NIPR reminder) On Oct 18, 2013, at 8:27 PM, Steve Smith wrote: > Forgot to relate the tidbit that motivated me to update the group: > > The "Covert Channels" reading, which is a very specialized example of > Steganography (by my measure) has some very clever ideas in it which I'd > never encountered before... all kind of obvious once described but > nevertheless quite clever. > > - Steve >> I don't know if anyone (else) is doing the reading for this course.... >> >> I lagged a bit but am just now catching up... the first 5 readings were >> history/law and *very* timely and relevant to the current situation with the >> NSA, etc. >> >> >> The following are more technical: >> Secure Email >> Tor (secure - obfuscated?) Routing >> Network Traffic Analysis >> Steganography >> Covert Channels >> Chat (off the record) >> ..... >> I've done my time working with or studying all of these at a fairly limited >> level and found each of the resources offered to be very well chosen... a >> good review for me and a good introduction for anyone with modest technical >> knowledge. They are also "bite sized"... I find the reading assignment >> for each week requiring less than an hour, though one can use these as a >> point of departure that could consume a whole week! >> >> I'm glad to hear that our best and brightest are being taught these things. >> >> - Steve >>> I'm in. A number of journos are interested in/worried about this. >>> -tj >>> >>> >>> On Mon, Sep 9, 2013 at 12:30 PM, Steve Smith <sasm...@swcp.com> wrote: >>> Cody - >>> >>> >>> I think you just started one (by asking). >>> >>> I suggest a Google Group for discussion and following the class schedule >>> even if we don't have the benefit of lecture and class discussions. >>> >>> 3 or more is a good number... if Owen's alerting us indicates interest, we >>> already have a Quorum!? >>> >>> - Steve >>>> that seems like a very cool reading list. Are you thinking of starting up >>>> a reading group? >>>> >>>> Cody Smith >>>> >>>> >>>> On Mon, Sep 9, 2013 at 10:09 AM, Owen Densmore <o...@backspaces.net> wrote: >>>> Another gem from twitter: >>>> Ed Felten >>>> Preliminary syllabus for my "Surveillance and Countermeasures" seminar: >>>> http://ow.ly/oHs9a >>>> Retweeted by BrendanEich >>>> >>>> http://www.cs.princeton.edu/courses/archive/fall13/cos597G/ >>>> >>>> Sounds fascinating .. and not all tech, lots of history and spy craft. >>>> >>>> -- Owen >>>> >>>> >>>> ============================================================ >>>> FRIAM Applied Complexity Group listserv >>>> Meets Fridays 9a-11:30 at cafe at St. John's College >>>> to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com >>>> >>>> >>>> >>>> ============================================================ >>>> FRIAM Applied Complexity Group listserv >>>> Meets Fridays 9a-11:30 at cafe at St. John's College >>>> to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com >>> >>> >>> ============================================================ >>> FRIAM Applied Complexity Group listserv >>> Meets Fridays 9a-11:30 at cafe at St. John's College >>> to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com >>> >>> >>> >>> -- >>> ========================================== >>> J. T. Johnson >>> Institute for Analytic Journalism -- Santa Fe, NM USA >>> 505.577.6482(c) 505.473.9646(h) >>> Twitter: jtjohnson >>> http://www.jtjohnson.com t...@jtjohnson.com >>> ========================================== >>> >>> >>> ============================================================ >>> FRIAM Applied Complexity Group listserv >>> Meets Fridays 9a-11:30 at cafe at St. John's College >>> to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com >> >> >> >> ============================================================ >> FRIAM Applied Complexity Group listserv >> Meets Fridays 9a-11:30 at cafe at St. John's College >> to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com > > ============================================================ > FRIAM Applied Complexity Group listserv > Meets Fridays 9a-11:30 at cafe at St. John's College > to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com
smime.p7s
Description: S/MIME cryptographic signature
============================================================ FRIAM Applied Complexity Group listserv Meets Fridays 9a-11:30 at cafe at St. John's College to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com