Archive for March 2016

HAX: the Chinese firm accelerating hardware, not software (Wired UK)

Wired is writing about The Chinese firm accelerating hardware, not software at   http://www.wired.co.uk/magazine/archive/2016/04/features/hax-hardware-accelerator-china In four years, HAX has invested in 100 companies after vetting what general partner Benjamin Joffe says are 1,000 startups a year. “It’s an investment company that functions as a hardware accelerator,” explains Joffe. “We help them manufacture at scale. Then

Why aren’t Stingrays rendered ineffective by standard MITM defenses? – Information Security Stack Exchange

http://security.stackexchange.com/questions/117460/why-arent-stingrays-rendered-ineffective-by-standard-mitm-defenses There’s been a lot of reporting in the past few years about law enforcement agencies using IMSI catchers (also known as Stingrays after a popular brand of them) to intercept cellular communications. Stingrays and other IMSI-catchers violate the cell tower agreements by producing an illegal signal, pretending to be a cell tower.They control the

History of the Amiga | Series | Ars Technica

Jeremy Reimer’s long-running History of the Amiga series is interesting reading for those who remember Commodore Amiga from their childhood. When it first arrived, the Amiga was a dream machine… http://arstechnica.com/series/history-of-the-amiga/ Posted from WordPress for Android

Who Has Your Back? Government Data Requests 2015 | Electronic Frontier Foundation

Who Has Your Back? 2015: Protecting Your Data From Government Requests report https://www.eff.org/who-has-your-back-government-data-requests-2015 We live digital lives—from the videos shared on social networks, to location-aware apps on mobile phones, to log-in data for connecting to our email, to our stored documents, to our search history. The personal, the profound, and even the absurd are all