_nullandnull_'s comments

_nullandnull_ | 11 years ago | on: Facebook launches ThreatExchange, a platform to share security threats

There seems to be some confusion in the comments here. This platform isn't for sharing or reporting vulnerabilities. It is for sharing data or indicators of compromise related to attacks. This data could be URLs or IPs, etc. The sharing of this type of data is already a common practice in vetted communities. Here are some links with more information.

http://threatexchange.fb.com/#slide=1

https://www.facebook.com/notes/protect-the-graph/understandi...

_nullandnull_ | 11 years ago | on: The NFL wants you to think these things are illegal

No, it's not misleading. "The National Football League takes in more than $9.5 billion per year and is exempt from Federal taxes." source http://www.forbes.com/sites/tomwatson/2014/01/30/the-real-su...

Update: Keep down-voting all you want. The Forbes article is weak in classifying all of the NFL as one entity. The below link gives a good overview of the structure of the NFL and it's tax exceptions. I'm glad I read it. That said the NFL still shouldn't be a non-profit organization. http://www.todayifoundout.com/index.php/2014/01/nfl-tax-exem...

_nullandnull_ | 11 years ago | on: An author used GitHub to write a book

Is this new to anyone? I have been using bit-bucket for writing a book for a couple of months. I figured this is pretty common. The Markdown language is great for writing technical material.

_nullandnull_ | 11 years ago | on: How to Hack an ADT Alarm System

> While I think this sort of research is useful- I dont think this is anything that will affect people in real life.

Minus the part where ADT is having to defend themselves against a class action suit. I'd consider that "real life".

_nullandnull_ | 11 years ago | on: Searching for Sex

Am I the only one that thought this article was super creepy? It reaffirms my reasoning of not using Google and if searching for anything personal in nature I should use TOR.

_nullandnull_ | 11 years ago | on: Keeping the Pirates at Bay – Copy and Crack Protection (2001)

> the author could then employ defense-in-depth techniques to maximize the cost of cracking the system.

Can you provide more details on this statement? I understand defense-in-depth and the different methodologies for cracking software but your statement doesn't make sense when applied as a whole. Do you have any examples?

_nullandnull_ | 11 years ago | on: Ford Tries to Shut Down Independent Repair Tool with Copyright

That is pretty shady of Ford. They were one of the few American car companies I kind of respected. Not anymore.

> Autel violated the anti-circumvention provisions of the Digital Millennium Copyright Act by writing a program to defeat the "encryption technology and obfuscation" that Ford used to make the file difficult to read.

This sounds a lot like Sega Enterprises Ltd. v. Accolade, Inc.

Check out https://en.wikipedia.org/wiki/Sega_v._Accolade

_nullandnull_ | 11 years ago | on: What happens to your bike after it’s stolen

> Routinely opened with a Bic pen jammed into the keyhole (from the article).

This one model of locks. That was fixed in 2004. The whole first paragraph is fluff. The author does not know how bikes are actually stolen. I had a nice bike and lived in NYC. I used the New York Fahgettaboudit Mini [1] and a small cheap chain for the front wheel. The Fahgettaboudit has anti-theft protection up to $4,500 in US. If you are going to leave your bike in public overnight you always risk having your bike stolen. The key is to have a good lock and don't have a bunch of expensive accessories that can be easily taken.

1 http://www.kryptonitelock.com/content/kryt-us/en/products/pr...

_nullandnull_ | 11 years ago | on: The best things and stuff of 2014

> Norwegian Wood, The Contortionists Handbook

I hope he reads both these books consecutively. These two books are worlds apart but both equally excellent. It would be an interesting contrast.

page 2