Some people see sandboxing as the future. Or completely segregating key functions from any open interface with the web. But I guess we are getting some way from the hacking story. Any more on certificates?
@jwallace Facebook isn't the only place to do this, other things to do. Basically you enter the password and then they text your phone number another code, you enter that code. Presumablely because you have your phone
They want to collect phone numbers, that's what they want. That's why, if you are rash enough to synch your Facebook account with your phone, Facebook will gather all the numbers saved, whether numbers belong to Facebook users or not.
I had a friend ask me about an email they received asking for their date of birth, password etc or their profile will be "removed"(don't recall per verbatum) and it directed them to 650-543-4800 (sort of offtopic but)
I may be misremembering, but I think the 6DEE essayist was big on quantum computing, which could indeed generate inconceivably long strings of code. But that won't happen yet; plus, we still have the problem. Someone needs to have the key or nobody will be able to use it.
@Nicole, his posts are somewhat incoherent, but the Comodo hack was to commemorate a massacre of Muslims in Srebrenica on the same day some years ago. He blames the Dutch government for intolerance against Muslims (DigiNotar is Dutch). I don't pretend to make sense of it all.
Fundamentally I think part of the problem is a lack of public understanding about the issues. "Security Certificate" holds no meaning to almost everyone. It might be a good time to start offering digital security 101 in schools so people understand
It's following in a simliar vein that a lot of the big breaches of the past year or so are following. Companies that claim to offer secure products are themselves being compromised. Another good example is the RSA breach of not too long ago
The whole Amazon.reader debate is a double-stupid. It's stupid to think that there's any e-book buyer who doesn't know Amazon's URL, and it was stupider to let ICANN launch the whole free-form TLD initiative to start with.
Enterprises would like to move to cloud computing but are hesitant because they are concerned about providers’ ability to secure company data. Here are some tips that help to ensure that if breaches occur, the business is not left holding the bag.
Edmunds separates customers into segments based on the info it collects on its site and from partners, and uses that to push out custom content, said Brian Baron, director of business analytics for Edmunds.com, at Predictive Analytics Innovation Summit.
The automotive website uses propensity modeling to target ads and customer registration forms, said Brian Baron, director of business analytics for Edmunds.com, at Predictive Analytics Innovation Summit.
Ushering in a new era of cognitive computing systems, IBM announced today the IBM Watson Engagement Advisor, a technology breakthrough that allows brands to crunch big data in record time to transform the way they engage clients in key functions such as customer service, marketing, and sales.
Expert Integrated Systems: Changing the Experience & Economics of IT In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator. READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE! REGISTER HERE
Wanted! Site Moderators Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?