So after my initial post, I decided to dig a bit deeper into the processes of DevOps, rather than go directly into the tools used (Docker, Kubernetes, Jira, etc.). I’m doing this mainly because the general view of many people in IT that DevOps is more about the tools used, rather than the actual processes that are needed to achieve success with DevOps.
Continue readingCategory Archives: Computer Security
Airline RFID Baggage Tags & Security
This year at DEFCON and on Twitter, I was asking people for their luggage tags for some research that I’m planning on doing. So I guess it’s time to explain what exactly I am looking into, what aspects of privacy I plan to maintain during my work, and the goals.
Continue reading
Peeple, the review site you never knew existed, but that you’re on because someone else signed you up for it
So, another day, another App or Startup.
This time it’s Peeple, a service like Yelp, but for reviewing actual people! So, it’s like a site that manages a database of information of different people and their reputations. All comments are NOT anonymous, and if any negative comment violates the rules, it might be removed. All relatively nice and interesting, but there’s a catch. And it’s a big one.
Or, you don’t even have to sign up for it to be on it. And no, the text message is to confirm that your profile has been added to the site, and NOTÂ to ask your permission to BE added.
The Sony Hack and Bandwidth
Ever since the GOP (Guardians of Peace) released corporate emails and data from Sony, there’s been huge amounts of speculation. Both by media and by security professionals alike. To sum it up, there are two lines of thought that have come up:
- North Korea is behind this (Media & FBI)
- It’s an inside job (IT Security experts)
But one thing has been on my mind, if it’s true that the GOP really has 100 Terabytes of files from Sony, how long would it take them to actually get it from Sony via the Internet?
Continue reading