Firefox adopts technique from Tor to blunt browser fingerprinting

The change, to curtail access to the Canvas API, is incremental and likely to be limited in how it is visible to regular users. However it signals some progress in a collaboration with the Tor project to incorporate code and ideas that benefit the privacy features of Firefox and Tor Browser. The Register’s write up includes a pretty good explainer on fingerprinting and why finding ways to mitigate it is important.
Read More …

Google’s reCaptcha cracked again

A couple of important points here. What was theoretically broken was the audio alternative option in reCaptcha. Bad but not as bad as it could be. What is probably worse, though, is that an exploit has been previously published of this same option, in fact using Google’s own voice processing API’s against it. Nothing about how Google can or will shore up this vulnerability.
Read More …

FCC chair’s battles extend beyond net neutrality

Wherever you may fall on the budget concerns of an uncapped program like Lifeline, Jon Brodkin’s piece contains enough to worry about in terms of Pai’s continuing dismantling of his predecessors service to the public interest. Re-raising the bar on ISPs wanting to offer subsidized service, regardless of the cap issue, clearly says a lot about Pai’s stance of meaningful adoption and access.

Read More …

Lessons for technologists from historical resistance

This piece Cory shares works on a couple of levels. 1st is the simple history of how tech workers interfered with the Nazis, a theme that reminds me in all the best ways of the history and historical fiction I have read around WWII code making and breaking efforts. Perhaps more importantly, here, Cory shares a plea for modern tech workers to consider what they can do to help protect those at most risk in ways similar to our historical antecedents, translated forward to today.
Read More …

FBI still arguing for “responsible encryption”

Why is this still a thing? There is no such thing as encryption only law enforcers can bypass. The math and computer science on this is pretty well settled, not to mention the terrifying unintended consequences that would be unleashed should the FBI should get its wish. Thankfully, EFF is still on top of this, as Kurt Opsahl does the usual solid analysis taking this to task and taking it apart.
Read More …