34
❌ SSPL is BAD ❌
SSPL is terrible for every user, companies and generally speaking, to the whole community. It is a warning signal of the bad days that are coming for everyone if all of us don't react fast.
law  license  tech 
12 weeks ago
GoogleChrome/ip-protection
icloud (whatever the name) proxy, but Google mode.
github  google  tech 
march 2024
The EU Entry/Exit system and EU travel authorisation system
The EU is planning to introduce new requirements for non-EU nationals to provide fingerprints and obtain a travel authorisation to enter the EU.
european-union  law  travel 
february 2024
Implementing decision - 2022/254 - EN - EUR-Lex
Commission Implementing Decision (EU) 2022/254 of 17 December 2021 pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the adequate protection of personal data by the Republic of Korea under the Personal Information Protection Act (notified under document C(2021) 9316)
european-union  law  privacy 
february 2024
Characterizing Smart Home IoT Traffic in the Wild
As the smart home IoT ecosystem flourishes, it is imperative to gain a better understanding of the unique challenges it poses in terms of management, security, and privacy. Prior studies are limited because they examine smart home IoT devices in testbed environments or at a small scale. To address this gap, we present a measurement study of smart home IoT devices in the wild by instrumenting home gateways and passively collecting real-world network traffic logs from more than 200 homes across a large metropolitan area in the United States. We characterize smart home IoT traffic in terms of its volume, temporal patterns, and external endpoints along with focusing on certain security and privacy concerns. We first show that traffic characteristics reflect the functionality of smart home IoT devices such as smart TVs generating high volume traffic to content streaming services following diurnal patterns associated with human activity. While the smart home IoT ecosystem seems fragmented, our analysis reveals that it is mostly centralized due to its reliance on a few popular cloud and DNS services. Our findings also highlight several interesting security and privacy concerns in smart home IoT ecosystem such as the need to improve policy-based access control for IoT traffic, lack of use of application layer encryption, and prevalence of third-party advertising and tracking services. Our findings have important implications for future research on improving management, security, and privacy of the smart home IoT ecosystem.
research  IoT  arxiv  dns 
february 2024
Our Take on Verifiable Credentials
An in-depth explanation on Verifiable Credentials from identity first principles, and how and why we think they will happen
tech  oauth  blog 
february 2024
cremich/cdk-bill-bot: The serverless cost optimization bot
Bill enables AWS customers to proactively monitor their infrastructure costs and identify unforeseen expenses in a timely manner. Bill wants to prevent AWS customers from receiving bad surprises in their monthly bill. Therefore he addresses two primary problem areas:

1. cost history is not monitored on a regular basis
2. basic cost optimization best practices are not setup
apps  aws  github  tech  news.hada.io 
august 2022
Meet WeatherKit - WWDC22 - Videos - Apple Developer
WeatherKit offers valuable weather data for your apps and services to help people stay up to date on the latest conditions. Learn how to use Swift and REST APIs to access information about the current weather, 10-day hourly forecasts for temperature, expected precipitation, wind reports, the UV Index, and more. We'll also share how WeatherKit can provide timely, hyperlocal weather information without compromising someone's personal data or their privacy.
api  apple  tech  weather 
july 2022
Documenting Architecture Decisions
ADR, Architecture Decision Record
tech 
july 2022
microk8s
The lightweight Kubernetes
Zero-ops, pure-upstream Kubernetes, from developer workstations to production.

https://ghostarchive.org/archive/GoynH
tech  kubernetes 
april 2022
What is Keyoxide?
Keyoxide allows you to prove "ownership" of accounts on websites, domain names, IM, etc., regardless of your username.

https://ghostarchive.org/archive/FY5NP
tech  pgp 
april 2022
Knowledge Graphs
In this paper we provide a comprehensive introduction to knowledge graphs, which have recently garnered significant attention from both industry and academia in scenarios that require exploiting diverse, dynamic, large-scale collections of data. After some opening remarks, we motivate and contrast various graph-based data models and query languages that are used for knowledge graphs. We discuss the roles of schema, identity, and context in knowledge graphs. We explain how knowledge can be represented and extracted using a combination of deductive and inductive techniques. We summarise methods for the creation, enrichment, quality assessment, refinement, and publication of knowledge graphs. We provide an overview of prominent open knowledge graphs and enterprise knowledge graphs, their applications, and how they use the aforementioned techniques. We conclude with high-level future research directions for knowledge graphs.
research  google  arxiv 
february 2022

Copy this bookmark:



description:


tags: