perezbox | 3 years ago | on: Do Lead Generation Platforms Generated Quality Leads?
perezbox's comments
perezbox | 5 years ago | on: Show HN: Discover and search for accounts across multiple Mastodon instances
perezbox | 5 years ago | on: Guide on how to block porn content – and protect your kids online
Unfortunately, that is not the case. Ask any parent, and I would wager that they feel really strong about what content their kids should be able to access.
Yes, there are aways to bypass, but that doesn't mean we should not deploy some controls to help reduce, limit, its ease of access.
perezbox | 6 years ago | on: The Open Web Is Dying
perezbox | 6 years ago | on: The Open Web Is Dying
perezbox | 6 years ago | on: The Open Web Is Dying
perezbox | 6 years ago | on: The Open Web Is Dying
perezbox | 6 years ago | on: The Open Web Is Dying
perezbox | 6 years ago | on: The Open Web Is Dying
I am curious how you believe it's misleading? In its simplest form, is that not how it's going to work in Phase I? User has to input their information, platform will do what it does, health organizations will consume some aspect of that data. It will then be used for notifications when in proximity of others?
In the link you shared, in the intro:
"Exposure Notification makes it possible to combat the spread of the coronavirus — the pathogen that causes COVID-19 — by alerting participants about possible exposure to someone they have recently been in contact with, who has subsequently been positively diagnosed as having the virus. The Exposure Notification Service is the vehicle for implementing exposure notification and uses the Bluetooth Low Energy wireless technology for proximity detection of nearby smartphones, and for the data exchange mechanism. "
The last sentence was "Building a web of social behavior information." Is that in essence what is happening? I am not saying that controls are not going to be implemented, and that data is not going to be protected. I am also not denying the social frameworks that another commentator alluded too.
I am, however, implying that regardless of what you find in documentation, I have been around technology long enough, and at the most senior levels of tech companies, to understand there is a difference between what you read and what a platform can, and can't, do.
Why is that misleading? Is it simplified for users to understand, sure, but dismissing it because it doesn't reference technical specs is a bit shortsighted.
perezbox | 6 years ago | on: The Open Web Is Dying
perezbox | 6 years ago | on: The Open Web Is Dying
perezbox | 6 years ago | on: The Open Web Is Dying
I couldn't agree more. It's really tough to write and share on your own platforms because exposure and dissemination is not what it used to be.
> consumer web is done, its owned by private companies, which control discoverability (google ads let’s say) then monetization (google ads) the Platform itself (android which gains data), membership and enforcement (google dev account)
I sadly, also, agree with this. This is another article I plan to write.
perezbox | 6 years ago | on: The Open Web Is Dying
perezbox | 6 years ago | on: The Open Web Is Dying
This is a great great point!
perezbox | 8 years ago | on: Hijack of Amazon’s domain service used to reroute web traffic for two hours
I'm the GM for Security Products at GoDaddy, responsible for the GoDaddy CA. I have checked with the team and do not see any certificates issued to: http://myetherwallet.com/ (including DV).
If someone has an image of what was seen, please send it to me at [email protected] so that we can investigate further.
Thanks
Tony
perezbox | 10 years ago | on: How botnets are created with hijacked Worpess, fake Flash downloads and Node.js
What you're referring to is Conditional Malware. We actually do very well with that, but there are no 100% solutions. There are also things that are hard, like Defacements and environments used for Phishing Lures..
All great points
perezbox | 10 years ago | on: How botnets are created with hijacked Worpess, fake Flash downloads and Node.js
Can we get a list of the domains you scanned that weren't recognized?
Thanks
perezbox | 10 years ago | on: How botnets are created with hijacked Worpess, fake Flash downloads and Node.js
Do you have any samples? One of the biggest reasons for this is if it's endpoint malware, versus website malware. Two very different things as you might know. Regardless, would love some samples if you any.
Tony
perezbox | 10 years ago | on: How botnets are created with hijacked Worpess, fake Flash downloads and Node.js
perezbox | 13 years ago | on: LivingSocial Hacked — More Than 50 Million Accounts Compromised