Search

Search this site:

Gunnar Wolf - Nice grey life - page 17

Showing posts 161 – 170

Open Source Symposium 2017
I travelled (for three days only!) to Argentina, to be a part of the Open Source Symposium 2017, a co-located event of the International Conference on Software Engineering. This is, all in all, an interesting although small conference — We are around 30 people in the room. This is a quite unusual conference for me, as this is among the first “formal” academic conference I am part of. Sessions have so far been quite interesting. What am I linking to from this image? Of course, the proceedings! They managed to publish the proceedings via the “formal” academic channels (a nice...

Progression and Forecast of a Curated Web-of-Trust: A Study on the Debian Project's Cryptographic Keyring
Attachments Article in proceedings (1991 KB)

Starting a project on private and anonymous network usage
I am starting a work with the students of LIDSOL (Laboratorio de Investigación y Desarrollo de Software Libre, Free Software Research and Development Laboratory) of the Engineering Faculty of UNAM: We want to dig into the technical and social implications of mechanisms that provide for anonymous, private usage of the network. We will have our first formal work session this Wednesday, for which we have invited several interesting people to join the discussion and help provide a path for our oncoming work. Our invited and confirmed guests are, in alphabetical order: Salvador Alcántar (Wikimedia México)Sandino Araico (1101)Gina Gallegos (ESIME Culhuacán)Juliana...

Construcciones reproducibles
El premio Turing1 de 1983 fue otorgado a Ken Thompson y Dennis Ritchie por «su desarrollo de la teoría genérica de los sistemas operativos, y específicamente, por la implementación del sistema operativo Unix». Su discurso de aceptación del premio, «Reflections on Trusting Trust»2 (pensamientos acerca de confiar en la confianza) ha sido uno de los pilares de la práctica de la seguridad informática. En dicho trabajo, Thompson sostiene que mientras haya gente como él, capaces de escribir un compilador a pelo, no podremos confiar auditoría alguna que hagamos a nuestro código — Su artículo demuestra cómo se puede troyanizar un...

On Dmitry Bogatov and empowering privacy-protecting tools
There is a thorny topic we have been discussing in nonpublic channels (say, the debian-private mailing list… It is impossible to call it a private list if it has close to a thousand subscribers, but it sometimes deals with sensitive material) for the last week. We have finally confirmation that we can bring this topic out to the open, and I expect several Debian people to talk about this. Besides, this information is now repeated all over the public Internet, so I’m not revealing anything sensitive. Oh, and there is a statement regarding Dmitry Bogatov published by the Tor project...

Cannot help but sharing a historic video
People that know me know that I do whatever I can in order to avoid watching videos online if there’s any other way to get to the content. It may be that I’m too old-fashioned, or that I have low attention and prefer to use a media where I can quickly scroll up and down a paragraph, or that I feel the time between bits of content is just a useless transition or whatever… But I bit. And I loved it. A couple of days ago, OS News featured a post titled From the AT&T Archives: The UNIX Operating System....

Dear lazyweb: How would you visualize..?
Dear lazyweb, I am trying to get a good way to present the categorization of several cases studied with a fitting graph. I am rating several vulnerabilities / failures according to James Cebula et. al.’s paper, A taxonomy of Operational Cyber Security Risks; this is a somewhat deep taxonomy, with 57 end items, but organized in a three levels deep hierarchy. Copying a table from the cited paper (click to display it full-sized): My categorization is binary: I care only whether it falls within a given category or not. My first stab at this was to represent each case using...

Much belated book presentation, this Saturday
Once again, I’m making an announcement mainly for my local circle of friends and (gasp!) followers. For those of you over 100Km away from Mexico City, please disregard this message. Back in July 2015, and after two years of hard work, my university finished the publishing step of my second book. This is a textbook for the subject I teach at Computer Engineering: Operating Systems Fundamentals. The book is, from its inception, fully available online under a permissive (CC-BY) license. One of the books aimed contributions is to present a text natively written in Spanish. Besides, our goal (I coordinated...

Started getting ads for ransomware. Coincidence?
Very strange. Verrrry strange. Yesterday I wrote a blog post on spam stuff that has been hitting my mailbox. Nothing too deep, just me scratching my head. Coincidentally (I guess/hope), I have been getting messages via my Bitlbee to one of my Jabber accounts, offering me ransomware services. I am reproducing it here, omitting of course everything I can recognize as their brand names related URLs (as I’m not going to promote the 3vi1-doers). I’m reproducing this whole as I’m sure the information will be interesting for some. *BRAND* Ransomware - The Most Advanced and Customisable you've Ever Seen Conquer...

Spam: Tactics, strategy, and angry bears
I know spam is spam is spam, and I know trying to figure out any logic underneath it is a lost cause. However… I am curious. Many spam subjects are seemingly random, designed to convey whatever “information” they contain and fool spam filters. I understand that. Many spam subjects are time-related. As an example, in the last months there has been a surge of spam mentioning Donald Trump. I am thankful: Very easy to filter out, even before it reaches spamassassin. Of course, spam will find thousands of ways to talk about sex; cialis/viagra sellers, escort services, and a long...


subscribe via RSS