tag:blogger.com,1999:blog-4503292949532760618.post2310553150074696036..comments2024-03-28T07:23:23.408-07:00Comments on DSHR's Blog: Brewster Kahle's "Distributed Web" proposalDavid.http://www.blogger.com/profile/14498131502038331594noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-4503292949532760618.post-13603176380368192822016-06-08T09:08:23.292-07:002016-06-08T09:08:23.292-07:00An interesting article about privacy risks in Name...An interesting article about <a href="http://128.130.60.29/papers/ccn-cache-editorial.pdf" rel="nofollow">privacy risks in Named Data Networking</a>. I need to think about this more but at first glance it seems that the task of targeted surveillance is no harder, but the task of dragnet surveillance is harder in a Named Data network.David.https://www.blogger.com/profile/14498131502038331594noreply@blogger.comtag:blogger.com,1999:blog-4503292949532760618.post-33867255155864107422016-05-11T10:17:33.507-07:002016-05-11T10:17:33.507-07:00Anyone who thinks that basing a new, better distri...Anyone who thinks that basing a new, better distributed Web on the ability to run JavaScript in people's browsers is viable needs to read Jérôme Segura's <a href="https://blog.malwarebytes.org/threat-analysis/2016/03/large-angler-malvertising-campaign-hits-top-publishers/" rel="nofollow"><i>Large Angler Malvertising Campaign Hits Top Publishers</i></a>.David.https://www.blogger.com/profile/14498131502038331594noreply@blogger.comtag:blogger.com,1999:blog-4503292949532760618.post-89420628060272109582016-05-03T12:50:39.727-07:002016-05-03T12:50:39.727-07:00Herbert van de Sompel points to MIT's Solid pr...Herbert van de Sompel points to <a href="https://solid.mit.edu/" rel="nofollow">MIT's Solid project</a> as being relevant to this space. I need to look into it when I'm not rushed off my feet.David.https://www.blogger.com/profile/14498131502038331594noreply@blogger.comtag:blogger.com,1999:blog-4503292949532760618.post-17107261385026018032016-04-20T06:53:28.023-07:002016-04-20T06:53:28.023-07:00The inherent risks of JavaScript (or other ways of...The inherent risks of JavaScript (or other ways of executing code on the client machine) are again revealed by the discovery that <a href="http://arstechnica.com/security/2016/04/dram-bitflipping-exploits-that-hijack-computers-just-got-easier/" rel="nofollow">the Rowhammer attack can be implemented in JavaScript</a>.David.https://www.blogger.com/profile/14498131502038331594noreply@blogger.com