Berkeley CSUA MOTD:Entry 14950
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/25 [General] UID:1000 Activity:popular
5/25    

1998/11/13-16 [Academia/Berkeley/Classes, Computer/SW/Security] UID:14950 Activity:nil
11/12   Wow, further proof that our dorms aren't as bad as we
        thought:
        http://www.nytimes.com/library/tech/98/11/circuits/articles/12prin.html
        \_ Unit 2 Cunningham has had this since '92.
        \_ got a username/passwd for us to use?
           \_ cypherpunk/cypherpunk
           \_ just create one for yourself
           \_ It's free.  Try this:
                http://verify.nytimes.com/subscribe/sub-bin/new_sub.cgi
        \_ What's that sound?  Is that the sound of freedom being chipped
           away, bit by bit?  What's that?  It's for my safety?  Gee, thanks.
        \_ Anyone know the detection range for our prox cards?  Is it the
           ~3 cm you have to get to the readers to get them to unlock the
           door, or could they be read from a longer distance in theory?
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/25 [General] UID:1000 Activity:popular
5/25    

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
Cache (4209 bytes)
www.nytimes.com/library/tech/98/11/circuits/articles/12prin.html
Lono for The New York Times KEEPING TABS - A card opens campus doors and also feeds information to a computer database. Princeton University, like many other institutions of higher education, worries about protecting its students. And one way to protect those students, when you have 4,600 of them, is with an electronic security system. But when most of those students are older than 18, the question is: Do they want to be protected? In the early 90's, Princeton began equipping all dormitories and other buildings with automatic locks and a system for unlocking the doors built around slim plastic cards called proximity cards, or prox cards, one issued to each student. The change has generated a campus debate over whether students want to trade the inconvenience and what many perceive as a loss of privacy for the increased security provided by keeping the dormitories locked all the time. The privacy question arises because not only does the security system read the prox cards to open doors, but it also records all card usage so there is a computer database of students' entries into campus buildings. To get into a dormitory, a student places a prox card -- which doubles as an identification card, library card and charge card for the university store and dining halls -- near a black plastic box encasing a tiny transceiver. Such electronic records are saved for three weeks before they are written over. For the safety of their students, universities often decide that campuses cannot be as freewheeling about physical movement as they are about the exchange of ideas. Yale University uses an electronic pass system similar to Princeton's and also keeps a record. Cynthia Atwood, a Yale spokeswoman, said: "We do have the capability of tracking individuals and their comings and goings from the residential college, but since we've installed this card system, we've had no complaints about privacy. Stepped-up security means the ability to track students' movements. But the increases in campus security have generated some opposition on the Princeton campus. Both The Nassau Weekly, a student newspaper, and The Princeton Alumni Weekly have reported objections and attempts to foil the system. Silverglate, who graduated from Princeton in 1964, doubt whether security systems that keep records of students' movements are appropriate for campuses. Silverglate is one of the two authors of "The Shadow University: the Betrayal of Liberty on America's Campuses" (Free Press, 1998), which argues that speech codes and authoritarian impulses are making campuses today too restrictive. One is proportionality and the second is the locus of control. Is the personal data collected proportional to the risk of harm? Hurley said she had been distressed to discover that her own university maintained a record of when she entered and left her parking garage. Princeton's students have been making their opinions known. A poll was taken in the last school year about the plan to keep the dormitories locked all the time -- known as "24-hour prox" -- said Jeff Siegel, a former student body president who is now a trustee of the university. Richard Spies, vice president for finance and administration at Princeton, said: "We just began to worry about what were still by anyone's standards a small number of incidents. But there were people who were in the dormitories who shouldn't have been there. The debate over the new system has led to a new policy governing when information gathered by the prox card system can be used. Barry Weiser, a crime-prevention specialist at Princeton, said an investigating officer who wanted such access must get approval from both the dean of student life and the head of campus security. Weiser said the records had been opened only once in the last six months or so, when the city police subpoenaed the records for one door in a case involving vandalism. The dean of student life and the head of security initially rejected the impulse to make the data available. That dean, Janina Montero, said: "The threshold for checking that information was determined to be fairly high. Most of the students said their primary objection was over the inconvenience of the system;
Cache (1138 bytes)
verify.nytimes.com/subscribe/sub-bin/new_sub.cgi -> www.nytimes.com
Soldiers Killed in Attacks in Iraq 75 For Bush, Same Goal in Iraq, New Tactics 76 Questions Arise About Falluja Leader's Record 77 At Least Five Foreigners Killed in Attack at Saudi Office By NEIL MacFARQUHAR Gunmen thought to be religious militants shot dead at least five foreign engineers and killed or wounded several Saudis. MURPHY The development of the modern urbanized West may have been based on a colossal miscalculation. Fiddler The New Jersey Symphony Orchestra bought a collection of rare instruments at a discount from a man who has since been indicted for tax fraud. Playoffs Roundup: Red Wings Lose Yzerman, and Flames Win the Game 156 Back Talk: Everyone Has a Theory About the Yankees' Slump 157 TECHNOLOGY 158 Yesterday's Back! Don't Forget to Examine the Fine Print 161 TRAVEL 162 Albania's Unexpected Rewards 163 Beguiled by Another Prague 164 Choice Tables: Budapest Chefs Venture Beyond Paprika and Goulash 165 BOOKS 166 'Nothing Lost': Even the Innocent Are Guilty 167 'Worse Than Watergate': The Stealth President 168 'The Myth of Moral Justice': Lawyer, Heal Thy Client 169 FASHION & STYLE 170 Sex With Einstein?