October 12, 2024

Archives for 2015

Anonymous programmers can be identified by analyzing coding style

Every programmer learns to code in a unique way which results in distinguishing “fingerprints” in coding style. These fingerprints can be used to compare the source code of known programmers with an anonymous piece of source code to find out which one of the known programmers authored the anonymous code. This method can aid in […]

Shaping Wi-Fi’s future: the wireless-mobile convergence

According to recent news, Comcast is being sued because it is taking advantage of users’ resources to build up its own nationwide Wi-Fi network. Since mid-2013 the company has been updating consumers’ routers by installing new firmware that makes the router partially devoted to the “home-user” network and partially devoted to the “mobile-user” network (a […]

Verizon's tracking header: Can they do better?

Verizon’s practice of injecting a unique ID into the HTTP headers of traffic originating on their wireless network has alarmed privacy advocates and researchers. Jonathan Mayer detailed how this header is already being used by third-parties to create zombie cookies. In this post, I summarize just how much information Verizon collects and shares under their […]

Cyberterrorism or Cybervandalism?

When hackers believed by the U.S. government to have been sponsored by the state of North Korea infiltrated Sony Pictures’ corporate network and leaked reams of sensitive documents, the act was quickly labeled an act of “cyberterrorism.” When hackers claiming to be affiliated with ISIS subsequently hijacked the YouTube and Twitter accounts of the U.S. […]