Wednesday, May 24, 2017

I'm never borrowing Osama's luggage again

from here (source image)

I realize some people like to personalize their luggage, but this is not the way to do it.

The dankest privacy setting

found on Privacy Memes

What I think the take-away here is is that there's a Tumblr dedicated to privacy memes. Clearly I'm not the only one who thinks using memes to promote important concepts like security or privacy is a good idea. I might be the only one persistent enough to keep at it for a decade, however.

Tuesday, May 23, 2017

We can re-purpose it - we have the technology

from here

True story, my computer died recently. It was in fact an XP machine (with a number of things to mitigate the added risks of using an OS that wasn't supported anymore).

Now it's my new banking PC (a computer I boot from a Linux LiveCD exclusively for the purposes of doing online banking), which is good because the previous one (that says Windows 2000 on the case) was frustratingly slow when used that way.

I wonder what I'll use that older one for now. Boat anchor? Space heater? Step stool?

If you really loved your country you wouldn't keep secrets from it

found on George Stephanis' blog

Just a friendly reminder to not let your government agencies act like overly attached girlfriends. They shouldn't need to be creepy and stalk you.

Monday, May 22, 2017

The first sample is on the house

from here

How to make a spare padlock key

Watch on YouTube

So, on the one hand this could be handy for making backup keys in case you ever lose the real ones. On the OTHER hand, since this is so easy, you should basically never trust a padlock that has been previously owned by someone else.

Wednesday, May 17, 2017

Copy&paste attribution for the copy&paste cyber threat

from here

Lately it seems like you can't swing a cat without hitting a cyber attack launched by a country that can't keep the lights on. I understand sometimes all the evidence seems to point that way, but you're talking about something that notoriously copied the tools used by one nation state, there has to be a strong suspicion that signs of other nation state's tools are also copied.