Apple designed iOS devices so that the hardware that encrypts data is in the path the data travels when it moves from flash storage to the iPhone’s main memory. This means that data can be automatically decrypted when read from flash into memory and reëncrypted when saved from memory back to flash.
From The iPhone Has Passed a Key Security Threshold.
An excellent piece by Nina Martyris celebrating Edward Lear, and especially the Owl and the Pussycat, on the bicentennial of his birth and through the lens of Danny Boyle’s recent London Olympics opening ceremony.
Apparently Aldous Huxley fell back on Lear’s humour in moments of depression. Martyris has some excellent examples of her own humour throughout, including while discussing Python Terry Jones’ opera of The Owl and the Pussycat, one which made me laugh out loud
the word “pussy” in the poem — when Lear wrote it, meant cat, not twat
Reading site The Millions picked the 10 books…
…that are hard to read for their length, or their syntax and style, or their structural and generic strangeness, or their odd experimental techniques, or their abstraction
I felt ashamed to say that I’ve read none of them, so immediately went to iBooks on my phone and found Clarissa, or, The History of a Young Lady by Samuel Richardson, which, to date, has been reasonably pleasant reading – albeit quite wordy and with some interesting grammatical constructs.
One thing which keeps coming to mind while reading Richardson’s opus has been the extent to which the written word, especially sentence structure, has become rather simpler and less descriptive than hitherto. There are probably many reasons for this, I’m interested in your thoughts on why.
…companies who hold the “keys to the castles,” can help by developing technologies that empower us to apply increasingly strong protections while also minimizing the day-to-day hassles of a complicated passphrase.
excellent piece by Daniel Jalkut on Matt Honan’s recent travails.
RSA, the manufacturer of ‘Security, Compliance and Risk-Management solutions have discovered a new method of delivering what’s known as an Advanced Persistent Threat:
methodology relies on “trojanizing” legitimate websites specific to a geographic area which the attacker believes will be visited by end users who belong to the organization they wish to penetrate.
In effect assuming a number of compromised computers or devices will be introduced into the targeted corporate network lying in wait like lions at a watering hole for the opportunity to attack.
When you visit a website, you are allowing that site to access a lot of information about your computer’s configuration. Combined, this information can create a kind of fingerprint — a signature that could be used to identify you and your computer. Some companies are already using technology to try to identify individual computers. But how effective would this kind of online tracking be?
EFF is running an experiment to find out. Panopticlick will anonymously log the configuration and version information from your operating system, your browser, and your plug-ins, and compare it to our database of many other Internet users’ configurations.
I guess I can trust Panopticlick from the Electronic Frontier Foundation to track me to see how much I can be tracked, right?
Interesting list of “the 50 best apps for children” as selected by The Observer.
A few of my own appear to be missing;
- ABC iView. This one, via Airplay and the Apple TV has effectively become “telly” for the little ones
- iWriteWords. This one was great for when the kids were first learning about letters and numbers
- Toca Robot Lab. Boy do they get never ending joy out of building robots and dragging them through the “factory”
What other apps do you recommend for the kids on your mobile device – any platform?