Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
Fighting bots is fighting humans
Fighting bots is fighting humans
One advantage to working on freely-licensed projects for over a decade is that I was forced to grapple with this decision far before mass scraping for AI training. In my personal view, option 1 is almost strictly better. Option 2 is never as simple as "only allow actual human beings access" because determining who's a human is hard. In practice, it means putting a barrier in front of the website that makes it harder for everyone to access it: gathering personal data, CAPTCHAs, paywalls, etc. This is not to say a website owner shouldn't implement, say, DDoS protection (I do). It's simply to remind you that "only allow humans to access" is just not an achievable goal. Any attempt at limiting bot access will inevitably allow some bots through and prevent some humans from accessing the site, and it's about deciding where you want to set the cutoff. I fear that media outlets and other websites, in attempting to "protect" their material from AI scrapers, will go too far in the anti-human direction.
·mollywhite.net·
Fighting bots is fighting humans
Wild new Wi-Fi routers turn your home network into a security radar
Wild new Wi-Fi routers turn your home network into a security radar
Wi-Fi security usually means keeping virtual intruders off your network, but a new system claims to be able to use Wi-Fi networks to detect physical intruders. Gamgee’s Wi-Fi Home Alarm System can learn to recognize people and pets who belong there and alert you to strangers – or perhaps even when…
·newatlas.com·
Wild new Wi-Fi routers turn your home network into a security radar
Students Target Teachers in Group TikTok Attack, Shaking Their School
Students Target Teachers in Group TikTok Attack, Shaking Their School
Seventh and eighth graders in Malvern, Pa., impersonating their teachers posted disparaging, lewd, racist and homophobic videos in the first known mass attack of its kind in the U.S.
·nytimes.com·
Students Target Teachers in Group TikTok Attack, Shaking Their School
The 2 Types of Data Strategies Every Company Needs
The 2 Types of Data Strategies Every Company Needs
Although the ability to manage torrents of data has become crucial to companies’ success, most organizations remain badly behind the curve. More than 70% of employees have access to data they should not. Data breaches are common, rogue data sets propagate in silos, and companies’ data technology often isn’t up to the demands put on it. In this article, the authors describe a framework for building a robust data strategy that can be applied across industries and levels of data maturity. The framework will help managers clarify the primary purpose of their data, whether “defensive” or “offensive.” Data defense is about minimizing downside risk: ensuring compliance with regulations, using analytics to detect and limit fraud, and building systems to prevent theft. Data offense focuses on supporting business objectives such as increasing revenue, profitability, and customer satisfaction. Using this approach, managers can design their data-management activities to support their company’s overall strategy.
·hbr.org·
The 2 Types of Data Strategies Every Company Needs
What Is Decentralized Identity?
What Is Decentralized Identity?
What is decentralized identity and why is it important? My attempt at a simple explanation.
·windley.com·
What Is Decentralized Identity?
Blockin’ bots. — ethanmarcotte.com
Blockin’ bots. — ethanmarcotte.com
Here’s how I’m blocking “artificial intelligence” bots, crawlers, and scrapers.
·ethanmarcotte.com·
Blockin’ bots. — ethanmarcotte.com
Blocking Bots With 11ty And Apache
Blocking Bots With 11ty And Apache
What's going on Internet? This is my homepage. I write about the web and stuff.
·flamedfury.com·
Blocking Bots With 11ty And Apache
Hacking Millions of Modems (and Investigating Who Hacked My Modem)
Hacking Millions of Modems (and Investigating Who Hacked My Modem)
Two years ago, something very strange happened to me while working from my home network. I was exploiting a blind XXE vulnerability that required an external HTTP server to smuggle out files, so I spun up an AWS box and ran a simple Python webserver to receive the traffic from the vulnerable server.
·samcurry.net·
Hacking Millions of Modems (and Investigating Who Hacked My Modem)
Semantically Secure
Semantically Secure
Semantics, semantic security, security.
·scottarc.blog·
Semantically Secure
Using AI/ML to build a Fraud Detection Model
Using AI/ML to build a Fraud Detection Model
Fraud detection involves finding patterns in data. In this blog post we will build an AI/ML model for fraud detection
·pradeepl.com·
Using AI/ML to build a Fraud Detection Model
API Security: Key Protocols - APIDNA
API Security: Key Protocols - APIDNA
Here we go through some of the essential protocols required for robust API security.
·apidna.ai·
API Security: Key Protocols - APIDNA
Encryption At Rest: Whose Threat Model Is It Anyway?
Encryption At Rest: Whose Threat Model Is It Anyway?
Head’s up: This is a blog post about applied cryptography, with a focus on web and cloud applications that encrypt data at rest in a database or filesystem. While the lessons can be broadly a…
·scottarc.blog·
Encryption At Rest: Whose Threat Model Is It Anyway?
Decentralized Identity Comes of Age
Decentralized Identity Comes of Age
In session after session, attendees at EIC are hearing the message that decentralized identity is the answer to their identity problems.
·windley.com·
Decentralized Identity Comes of Age
Let’s Stop the Security Shaming
Let’s Stop the Security Shaming
When I started this blog over a decade ago, my understanding of postmodernism arose from my college studies of art history and aesthetics. Like Camille Paglia, I was not a fan of the movement or th…
·postmodernsecurity.com·
Let’s Stop the Security Shaming
Treasury Sanctions Creators of 911 S5 Proxy Botnet
Treasury Sanctions Creators of 911 S5 Proxy Botnet
The U.S. Department of the Treasury today unveiled sanctions against three Chinese nationals for allegedly operating 911 S5, an online anonymity service that for many years was the easiest and cheapest way to route one's Web traffic through malware-infected computers…
·krebsonsecurity.com·
Treasury Sanctions Creators of 911 S5 Proxy Botnet