User Tracking Apps

There’s an interesting story out there about ads that play ultrasonic sounds that permit cross-device tracking. While this is being described as detecting devices that all belong to one user, it seems possible it would sometimes detect devices all belonging to the same family – a slightly different task but also one marketers are interested in solving. It likely depends on where and how frequently these linking ultrasonic sounds are emitted. And, as I’ve seen others note and is alluded to late in this article, the SilverPush software development kit that is largely being credited for current implementations of this technique … Continue reading User Tracking Apps

Security/Learning Linkdump

I’ve accumulated a big collection of links this summer that are roughly related to security and/or machine learning and mostly connected to personal identification or human characteristics that I’m intending to share with my senior students when they return to campus in a few weeks. Having just noticed quite how large the collection has grown, it seems kind to pull them together into a semi-organized structure, as compared to my original plan of hitting send on an email filled with URLs, for their sake as well as my own. Taken together, it’s a nice little reading list. How your smartphone’s battery life … Continue reading Security/Learning Linkdump

Lorem ipsum ipsum ipsum lorem

“While Google translate may be incorrect in the translations of these words, it’s puzzling why these words would be translated to things such as ‘China,’ ‘NATO,’ and ‘The Free Internet,’” There is so much to love in this exploration of what happens when you feed lorem ipsum text into Google Translate from Krebs on Security (or, at least what used to happen). Automatic translation algorithms, data sparsity problems, covert information channels… A bizarre, must-read article.

Free Service Botnets

How Hackers Hid a Money-Mining Botnet in the Clouds of Amazon and Others: a couple of security researchers build a botnet out of free accounts, potentially legally they claim, rather than from hijacked computers. They proof of concept tested Litecoin mining, suggesting they could have brought in $1750/week with their constructed botnet if left running. While the article cites Amazon and Google’s services as examples, the following suggests an alternate source for these vulnerable accounts: Choosing among the easy two-thirds, they targeted about 15 services that let them sign up for a free account or a free trial. The researchers … Continue reading Free Service Botnets