Some people see sandboxing as the future. Or completely segregating key functions from any open interface with the web. But I guess we are getting some way from the hacking story. Any more on certificates?
@jwallace Facebook isn't the only place to do this, other things to do. Basically you enter the password and then they text your phone number another code, you enter that code. Presumablely because you have your phone
They want to collect phone numbers, that's what they want. That's why, if you are rash enough to synch your Facebook account with your phone, Facebook will gather all the numbers saved, whether numbers belong to Facebook users or not.
I had a friend ask me about an email they received asking for their date of birth, password etc or their profile will be "removed"(don't recall per verbatum) and it directed them to 650-543-4800 (sort of offtopic but)
I may be misremembering, but I think the 6DEE essayist was big on quantum computing, which could indeed generate inconceivably long strings of code. But that won't happen yet; plus, we still have the problem. Someone needs to have the key or nobody will be able to use it.
@Nicole, his posts are somewhat incoherent, but the Comodo hack was to commemorate a massacre of Muslims in Srebrenica on the same day some years ago. He blames the Dutch government for intolerance against Muslims (DigiNotar is Dutch). I don't pretend to make sense of it all.
Fundamentally I think part of the problem is a lack of public understanding about the issues. "Security Certificate" holds no meaning to almost everyone. It might be a good time to start offering digital security 101 in schools so people understand
It's following in a simliar vein that a lot of the big breaches of the past year or so are following. Companies that claim to offer secure products are themselves being compromised. Another good example is the RSA breach of not too long ago
You've heard the expression, "Out of the frying pan, into the fire?" Amazon lives in the fire. The e-tailer wins by keeping things hot for its competitors, employees, and itself, according to a new book.
Positec, a manufacturer of power tools for homes and commercial applications, achieves greater customer service flexibility and cuts hold times in half by using a cloud-based service to manage its call center.
Big-data and analytics tools enable marketers to understand customers as individuals, identifying unmet needs and addressing each customer as a "segment of one," says John Kennedy, VP corporate marketing, IBM.
Expert Integrated Systems: Changing the Experience & Economics of IT In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator. READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE! REGISTER HERE
Wanted! Site Moderators Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?