Formula 1 Technology – Offtrack

Pun fully intended. In my days as a rapid Formula 1 and Ferrari fan, I was often posed the question: “What do companies get out of it?” F1 teams sink hundreds of millions of euros, attract spnsors by the sticker-bucketload and have a carbon footprint like a california suburb. So whats the benefit?

Well the teams obviously get the benefit of the research which eventually makes it’s way into commercial vehicles. But there’s also stuff like this.

Advertisements

Harvard 2007 Circumvention Landscape Report

Almost everyone today deals with the frustration of ‘blocked’ internet sites. From corporate firewalls all the way up to The Great Firewall of China, the Powers-that-want-to-be continue to take it upon themselves to judge the internets on the behalf of other people and censor the word of the masses.

I am a staunch advocate of free, universal and unbiased access to information and knowledge . People should be allowed to absorb all that their reality can throw at them and use their own mental faculties (limited as they too often are) to come to conclusions, make informed decisions, and generally live smarter lives. Moreover, any form of internet censorship is far too heavily reliant on some form of subjective judgment of the ‘worthiness’ of a website to be accessed, makes certain excessively rude assumptions on the moral and intellectual fibre of the audience and with respect to knowledge, attempts to play god. Organizations that I’ve interacted with on this topic have little to no justification for blocking any site. Almost everything is blocked under the catch-all Holy Trinity of justifications – a)distraction to employees b)source of malicious software (viruses, malware, etc) and c) bandwidth hog. Considering the expectations placed on corporates to be accessible and ready-to-work 24/7 with the advent of the blackberry and other remote-working technologies, the argument that time at work should be exclusively used for work just is not worth a response. National level censoring, well, thats just malarkey.

I need to add a caveat here to my rant, while I do not support any form of internet-browsing censorship, I do agree, at the organizational level, with some amount of prevention of the use of P2P software. The lack of intelligence and awareness displayed by most P2P users make the softwares a risk to an organization’s data assets. Coupled with the complete (current) lack of use of P2P for corporate work, blocking P2P has few cons, imho.

My rant was rather inspired by the 2007 Circumvention Landscape Report. 2 years in the making, the report profiles all the major circumvention systems and implementing tools currently available.

As the Internet has exploded over the past fifteen years, recently reaching over a billion users, dozens of national governments from China to Saudi Arabia have tried to control the network by filtering out content objectionable to the countries for any of a number of reasons. A large variety of different projects have developed tools that can be used to circumvent this filtering, allowing people in filtered countries access to otherwise filtered content. In this report, we describe the mechanisms of filtering and circumvention and evaluate ten projects that develop tools that can be used to circumvent filtering: Anonymizer, Ultrareach, DynaWeb Freegate, Circumventor/CGIProxy, Psiphon, Tor, JAP, Coral, and Hamachi. We evaluated these tools in 2007 — using both tests from within filtered countries and tests within a lab environment — for their utility, usability, security, promotion, sustainability, and openness. We find that all of the tools use the same basic mechanisms of proxying and encryption but that they differ in their models of hosting proxies. Some tools use proxies that are centrally hosted, others use proxies that are peer hosted, and others use re-routing methods that use a combination of the two. We find that, in general, the tools work in the sense that they allow users to access pages that are otherwise blocked by filtering countries but that performance of the tools is generally poor and that many tools have significant, unreported security vulnerabilities.

The report was completed in 2007 and released to a group of private sponsors. Many of the findings of the report are now out of date, but we present them now, as is, because we think that the broad conclusions of the report about these tools remain valid and because we hope that other researchers will benefit from access to the methods used to test the tools.

Responses from developers of the tools in question are included in the report.

The report itself (almost 100 pages) makes some excellent points on the social factors in internet censorship. This is a good post on the same than I could write.

Pwn to Own is back!

After the very-awesome Pwn to Own 2008, DVLabs is back with the next episode, set for March 16-20, 2009 at the CanSecWest Security in Vancouver, BC, Canada.

Pwn to Own is a 3-day hacking competition run by DVLabs’ Zero Day Initiative Team. Last year’s objective was for teams to break into Operating Systems – Ubuntu 7.1o, Vista Ultimate SP1 and Mac OSX 10.5.2. Day 1 – teams had to penetrate vanilla installations of the OSs. (they all failed). Day 2 – they could use browsers (and their vulnerabilities) to break into the system. (Macbook air was pwned, courtesy a safari vulnerability. Vista and Ubuntu survived). Day 3 – teams could use 3rd party apps. (Vista was pwned. of course. Ubuntu survived all 3 days. OF COURSE.)

This year’s contest, interestingly, is going to focus on cracking browsers and mobile devices. I can’t wait.

I r photoshoppin’

well…not really. Atleast not on Adobe Photshop (or cheaper equivalent).

I discovered this wonderful little website via TechCrunch.

I’ve used the free photo editor that Adobe offered about a year+ on their site and from a serious art PoV, I was decidedly unimpressed. To be fair, its targeted at more casual users touching up vacation photos and not at artists (even wannabe ones like me).

Provided you have a good internet connection, it fills a niche which, imo, is still vacant. Its a good tool between full-on hardcore an expensive desktop apps like Adobe Photoshop and Corel Painter and free junk like mspaint and paint.net. The only comparable app (i.e. free and powerful) that i know of is GIMP, which is tear-out-yer-eyeballs awkward to use.

Social Media People at Davos

TechCrunch interviewed Facebook’s COO Sheryl Sandberg, MySpace CEO Chris Dewolfe and and LinkedIn’s Reid Hoffman.

The one that interested me is the LinkedIn interview. With LinkedIn gaining a million people a day and being so focussed on the professional workplace, its reflects real life a lot more than facebook/myspace.

Reid Hoffman mentioned something interesting:

Everyone knew we’d get an uptick from job seekers, free agents, consultants. A pleasant surprise is the recruiting space, all of our customers are keeping or increasing their spend. Recruiting business is growing.

Is recruiting business growing just because more job seekers are roaming linkedIn than pre-slump? Or is it also indicative of greater adoption in general of LinkedIn by recruiters?

Apple and their patent – Part 2

Apple vs Palm. Only on pay-per-view.

Or not, if engadget’s analysis is to be believed. While it may be true that an Apple lawsuit may not have a leg to stand up unless someone mimics Apple’s scrolling system, everyone who thinks Apple will try anyway raise your hands.

It provides me pleasure that Palm’s got even more ammo on Apple (apparently) than vice-versa. Maybe they’ll leave each other alone and actually spend money on new products for us instead.

posted via Scribefire