136 private links
To be honest, I have a hard time imagining Internet 2.0. I’m old enough to remember the utopian enthusiasm that greeted the Internet when it emerged 20 years ago. We can’t go back—we know too much now—but maybe we can learn from what we loved about the Internet back then. Namely, its egalitarian nature—that homemade and small-scale sites were just as accessible as the emerging e-commerce platforms. It was a pleasant, chaotic jumble. Can we revive the feeling of a souk and lose the big-box store feel?
2do blog
The audience actually wants to work for their meal. They just don’t want to know that they’re doing that. That’s your job as a storyteller is to hide the fact that you’re making them work for their meal. We’re born problem solvers. We’re compelled to deduce and to deduct because that’s what we do in real life. It’s this well-organized absence of information that draws us in.
The Sony Walkman TPS-L2 introduced in 1979 is one of those legends. It's the first Walkman ever made and the first product I'm showcasing that's older than myself. This was the first time music became truly portable making it historically more significant than even the iPod. The TPS-L2 has become a collector's favorite so expect to pay a premium for one in good condition. I was lucky and purchased this from a university museum for a reasonable price.
At its heart, Tails is a version of the Linux operating system optimized for anonymity. It comes with several privacy and encryption tools, most notably Tor, an application that anonymizes a user’s internet traffic by routing it through a network of computers run by volunteers around the world.
Most of the attention around the Heartbleed attack has focused on the simplest and most obvious scenario: a malicious client attacking an HTTPS server to steal cookies, private keys, and other secrets. But this isn't the only attack possible: a malicious server can also send bad heartbeat packets to a client that uses OpenSSL and extract data from that client. The TLS heartbeats used in this attack are symmetric: they can be initiated by either the "client" or the "server" in a TLS connection, and both endpoints use the same vulnerable parsing code.
2blog
2blog
Am Donnerstag, 9. Jannuar @MetalabVie: Netzfreiheit Treffen, 20:00 - 22:00. https://t.co/S1eP2tTCxQ
#CryptoParty am 2014-01-17 in Steyr! http://t.co/72WHPQmUz9 Die Teilnahme ist wie immer kostenlos!