What ISPs Can See

Even with widespread TLS usage, website metadata and DNS queries are still easily collectible. “Today, ISPs can see a significant amount of their subscribers’ Internet activity, and have the ability to infer substantial amounts of sensitive information from it. This is especially true when that traffic is unencrypted. However, even when Internet traffic is encrypted using HTTPS, ISPs generally retain visibility into their subscribers’ DNS … Continue reading What ISPs Can See

The Problem With AMP

AMP, Instant Pages and similar convenience features are nothing but a gilded cage. “Make no mistake. AMP is about lock-in for Google. AMP is meant to keep publishers tied to Google. Clicking on an AMP link feels like you never even leave the search page, and links to AMP content are displayed prominently in Google’s news carousel. This is their response to similar formats from … Continue reading The Problem With AMP

The use of sapphire in mobile device and LED industries

Gorilla Glass 5 should be in widespread production by the time this is posted that has superior qualities, but it’s still interesting to note the production and use of Sapphire in our technology. “Once valued only as a gemstone, sapphire is now an engineered material with a wide variety of industrial uses. These two article have concentrated on its use in mobile devices for everything … Continue reading The use of sapphire in mobile device and LED industries

[Guide] Budget Home Server Upgrade (Pt. 3): NAS Follow Up

Time for an update – It’s been more than 3 years now since I set up my Dell T5500 home server in it’s current form and in short, it’s been running like a dream. Just one of the RAID drives failed over time, which I’ll outline below, I will also go into detail about the current hardware setup and VM services running, the addition of … Continue reading [Guide] Budget Home Server Upgrade (Pt. 3): NAS Follow Up

We Are Hopelessly Hooked

On technological addiction in our age, the problem of our time. I think we reached peak human in 2015 sometime, from there it was all downhill. “Of course, posting to Facebook or Instagram also contributes to the global accumulation of FOMO. What Eyal describes, without seeming fully to appreciate it in human terms, is a closed cycle of anxiety creation and alleviation. What are others … Continue reading We Are Hopelessly Hooked

Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs

An older article from about 12 months ago, but still interesting nonetheless. I’m writing this now in Jul/2016, and by the time it gets published in Jan/2017, I’m certain that there will be multiple high-profile remote security breaches in cars (like the Jeep one from last year). Automobile manufacturers are notoriously bad at in-car technology, but are desperate to add the latest tech and apps, … Continue reading Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs