• Online Lecture - Ross Anderson: Information Hiding

    Over the last five years, techniques for hiding information have become a rapidly growing research topic. Its better-known aspects range from inserting imperceptible copyright marks in digital audio and video, through auctions and elections, to de-identifying medical records for use in research. As we explore these applications, it becomes clear that the traditional protection goals of `confidentiality, availability and integrity' are insufficient. In this talk, I will discuss the role of anonymity in computer security. Anonymity mechanisms allow us to construct networks and file systems that are resistant to selective denial of service attacks, or which let their owners plausibly deny their existence (thus providing some protection against coercion). They can help us to meet protection goals such as personal privacy, location security and plausible deniability.

    http://wean1.ulib.org/videoMain.asp?target=/Lectures/Distinguished Lectures/1999/03.0 Anderson/SLIDECENTRIC

    Urs

     

  • Privacy: Google's power makes security officials nervous

    Google's power makes security officials nervous. Google has fast become the Internet search engine everyone clicks on to find out nearly anything about anyone, including financial, political and other presumably private data. But national security officials and others -- reportedly even Google CEO Eric Schmidt -- are getting a bit uncomfortable about Google's extraordinary reach. Schmidt was most unhappy when an Internet news reporter, writing about Google and privacy, used the search engine and quickly found and revealed Schmidt's home address!

    http://www.detnews.com/2005/technology/0509/25/A25-325993.htm

    Lord and master, hear my call! Ah, here comes the master! I have need of Thee! From the spirits that I called Sir, deliver me!
    The Sorcerer's Apprentice - Johann Wolfgang Goethe

    ;-)

    Urs

  • A week in Redmond

    During the last week, I have been on the Microsoft Campus in Redmond. We had the Quarterly Meeting of the worldwide Chief Security Advisors. During those meetings we usually meet with the products groups to discuss your needs and our plans.Additionally we meet with Scott Charney (Head of Trustworthy Computing) and Mike Nash (Head of the Security Technology Unit). Those are the ones really driving our strategies and technologies aroung Security.

    A lot of the discussions have been internally but what I can really tell you is that I am excited about all the progress we made in the area of security in our products as well as with the security products to come.

    This will actually be an exciting time from now on for the next 18 months. Watch out for the announcements to come

    Roger

  • Organisations need a digital evidence plan

    Businesses could lose legal disputes and miss out on insurance claims because of their inability to collect and preserve computer and internet-based evidence, experts have warned.
    While firms are investing heavily in disaster recovery plans for low-probability events such as fire or terrorism, many are failing to identify and preserve important digital evidence required to tackle more frequent incidents, such as payment disputes, employment tribunals and fraud.

    http://www.vnunet.com/computing/news/2142618/organisations-digital-evidence

    Urs

     

  • NSA granted Net location-tracking patent

    The National Security Agency has obtained a patent on a method of figuring out an Internet user's geographic location. Patent 6,947,978, granted Tuesday, describes a way to discover someone's physical location by comparing it to a "map" of Internet addresses with known locations.

    http://news.com.com/2100-7348_3-5875953.html

    Urs