-
Screenshot forensics
One of the interesting thing I like to do when reading (security) blog posts, is to try to deduce details about the machine setup used. You can find some very interesting tidbits of information, like Sunbelt using Symantec AV on some of their machines. A couple of current examples: a CA researcher uses Office 2007…
-
Anonymous browsing is hard
From the “big fricking surprise department” comes the news that “private browsing is hard to implement“. Well, duh! Also, quite obvious: the biggest problem were “Flash cookies” – again, duh!, since they are stored outside of the browser, so there is not very much the browser can do about them. There are many ways users…
-
Privacy risks of signed Java applets
Probably it is an occupational hazard, but when I’ve listened to episode #222 of the Java Posse (1/3 of the devil :-D) and they talked about a java applet do do screencasts, my first reaction was: is it possible to do this from an applet? isn’t this a privacy risk? The answer is: it depends…
-
Tracking Users Via the Browser Cache
From the department of old things I didn’t know about comes the following bit: Tracking Users Via the Browser Cache. Original story: meantime: non-consensual http user tracking using caches. Also covered here: Clearing cookies is not enough to save your privacy. And it was already posted on slashdot (so please don’t post it again :)).…
-
Tracking web users
Again, this will be something new here (at least for me): I’ll publish a pre-rant for Security Now! Steve Gibson expressed interest in the subject of cookies, so I’ll tackle that in this post and also the more general question of user-tracking. I discuss different ways it can be accomplished, ways you could protect yourself…
-
Is your IT department doing this?
While the subtitle of the newspaper is laughable (The independent voice of the Microsoft IT community), I think that the article is very nicely written: IT Gone Bad.