Links


Google is giving data to police based on search keywords, court docs show

cnet.com

Investigators linked Williams to the arson, as well as witness tampering, after sending a search warrant to Google that requested information on “users who had searched the address of the residence close in time to the arson.” Β 

This is bad precedent; the analogy that springs to mind is suspicion for a crime not just for being in the wrong place at the wrong time, but also not needing to bear any resemblance to a suspect.

Eddie Van Halen deconstructs his collaboration on 'Beat It'

cnn.com

I’ll never forget when Tower Records was still open over here in Sherman Oaks. I was buying something, and “Beat It” was playing over the store sound system. The solo comes on, and I hear these kids in front of me going, “Listen to this guy trying to sound like Eddie Van Halen.” I tapped him on the shoulder and said, “That IS me!” That was hilarious.

SSH Agent Explained

smallstep.com

In this post, I’ll explain what the agent is, how to use it, and how it works to keep your keys safe. I’ll also describe agent forwarding and how it works. I’ll help you reduce your risk when using agent forwarding, and I’ll share an alternative to agent forwarding that you can use when accessing your internal hosts through bastions.

Hacking a Coffee Maker

schneier.com

Specifically, he could trigger the coffee maker to turn on the burner, dispense water, spin the bean grinder, and display a ransom message, all while beeping repeatedly. Oh, and by the way, the only way to stop the chaos was to unplug the power cord.