Monthly Shaarli

All links of one month in a single page.

January, 2019

Adversarial WiFi Sensing using a Single Smartphone

Wireless devices are everywhere, at home, at the office, and on the street. Devices are bombarding us with transmissions across a wide range of RF frequencies. Many of these invisible transmissions reflect off our bodies, carrying off information about ou location, movement, and other physiological properties. While a boon to professionals with carefully calibrated instruments, they may also be revealing private data about us to potential attackers nearby.
In this paper, we examine the problem of adversarial WiFi sensing, and consider whether ambient WiFi signals around us pose real risks to our personal privacy. We identify a passive adversarial sensing attack, where bad actors using a single smartphone can silently localize and track individuals in their home or office from outside walls, by just listening to ambient WiFi signals. We experimentally validate this attack in 11 real-world locations, and show user tracking with high accuracy. Finally, we propose and evaluate defenses including geo-fencing, rate limiting, and signal obfuscation by WiFi access points.

Five years at the edge: recording the evolution of web usage from an ISP | APNIC Blog

Since 2013, we at the SmartData@Polito lab, Politecnico di Torino, have been conducting a large-scale measurement study from the perspective of a Tier-1 ISP based in Europe. We do this to better characterize Internet usage trends, as well as the technologies and infrastructure changes, that are being implemented by the industry for the benefit of forecasting potential changes and expenses.

Goldilocks principle

The Goldilocks principle is named by analogy to the children's story The Three Bears, in which a little girl named Goldilocks tastes three different bowls of porridge and finds that she prefers porridge that is neither too hot nor too cold, but has just the right temperature.

Doing Despite Disliking: Self‐regulatory Strategies in Everyday Aversive Activities

We investigated the self‐regulatory strategies people spontaneously use in their everyday lives to regulate their persistence during aversive activities.

GitHub - errata-ai/vale: A syntax-aware linter for prose built with speed and extensibility in mind.

A syntax-aware linter for prose built with speed and extensibility in mind.

DTrace a Docker Container | Oracle Linux Blog

Here, we illustrate use of DTrace on a host system to observe activity within a Docker container, running on Oracle Linux using runC.

PostgreSQL: The dangers of streaming across versions of glibc: A cautionary tale

Streaming replicas—and by extension, base backups—can become dangerously broken when the source and target machines run slightly different versions of glibc.

Is there hope for IPv6? - Internet Governance Project

The ongoing competition between IPv4 and IPv6 has big implications for the future of the internet. Is this mixed-standard Internet a passing phenomenon, or will we get stuck in it?

ReiKey

Malware and other applications may install persistent keyboard "event taps" to intercept your keystrokes.
ReiKey can scan, detect, and monitor for such taps!

PostgreSQL is the DBMS of the Year 2018

PostgreSQL is the database management system that gained more popularity in our DB-Engines Ranking within the last year than any of the other 343 monitored systems.
We thus declare PostgreSQL as the DBMS of the Year 2018.

media.ccc.de -The Ghost in the Machine

Artificial Intelligence gives us a uniquely fascinating and clear perspective at the nature of our minds and our relationship to reality. We will discuss perception, mental representation, agency, consciousness, selfhood, and how they can arise in a computational system, like our brain.

Rapid serial visual presentation - Wikipedia

Rapid serial visual presentation is an experimental model frequently used to examine the temporal characteristics of attention. The RSVP paradigm requires participants to look at a continuous presentation of visual items which is around 10 items per second.

Microsoft Acquires Citus Data: Creating the World’s Best Postgres Experience Together
research!rsc: Our Software Dependency Problem

For decades, discussion of software reuse was far more common than actual software reuse. Today, the situation is reversed: developers reuse software written by others every day, in the form of software dependencies, and the situation goes mostly unexamined.

Katacoda - Interactive Learning Platform for Software Engineers

Interactive Learning and Training Platform for Software Engineers. Helping Developers Learn and Companies Increase Adoption.

Metrics That Matter - ACM Queue

Critical but oft-neglected service metrics that every SRE and product owner should care about.

The Penetration Testing Execution Standard
GitHub - trailofbits/twa: A tiny web auditor with strong opinions.

A tiny web auditor with strong opinions.

Pointing and calling - Wikipedia

Pointing and calling is a method in occupational safety for avoiding mistakes by pointing at important indicators and calling out the status. It is common in Japan and railways of China.

ssh-vault

encrypt/decrypt using ssh keys

GitHub - amperser/proselint: A linter for prose.

A linter for prose.

Amazon Aurora: Design Considerations for High Throughput Cloud-Native Relational Databases

Amazon Aurora is a relational database service for OLTP workloads offered as part of Amazon Web Services (AWS). In this paper, we describe the architecture of Aurora and the design considerations leading to that architecture. We believe the central constraint in high throughput data processing has moved from compute and storage to the network. Aurora brings a novel architecture to the relational database to address this constraint, most notably by pushing redo processing to a multi-tenant scale- out storage service, purpose-built for Aurora. We describe how doing so not only reduces network traffic, but also allows for fast crash recovery, failovers to replicas without loss of data, and fault-tolerant, self-healing storage. We then describe how Aurora achieves consensus on durable state across numerous storage nodes using an efficient asynchronous scheme, avoiding expensive and chatty recovery protocols. Finally, having operated Aurora as a production service for over 18 months, we share lessons we have learned from our customers on what modern cloud applications expect from their database tier.

How NetBSD came to be shipped by Microsoft. | A Dinosaur Contemplating Asteroids

NetBSD on the Danger HipTop/T-Mobile Sidekick Smartphone.

GitHub - kristapsdz/openrsync: clean-room BSD-licensed implementation of rsync

This is a clean-room implementation of rsync with a BSD (ISC) license. It's compatible with a modern rsync (3.1.3 is used for testing), but accepts only a subset of rsync's command-line arguments.

TLS-SRP - Wikipedia

Transport Layer Security Secure Remote Password (TLS-SRP) ciphersuites are a set of cryptographic protocols that provide secure communication based on passwords, using an SRP password-authenticated key exchange.

Automating Datacenter Operations at Dropbox | Dropbox Tech Blog

Pirlo was designed to eliminate and automate many of these manual processes. In this post we will describe Pirlo, a flexible system designed to validate and configure network switches and to ensure the reliability of servers before they enter production. We will explain the design of Pirlo and its components, and show how some of the design choices we have made enable Dropbox to manage our physical infrastructure operations efficiently and safely.

Highly Available MySQL Clusters at WePay

This post describes WePay's highly available MySQL architecture, and how we achieve short outage times during failures.

The World’s Writing Systems

This web site presents one glyph for each of the world’s writing systems. It is the first step of the Missing Scripts Project, a long-term initiative that aims to identify writing systems which are not yet encoded in the Unicode standard. As of today, there are still 146 scripts not yet encoded in Unicode.

GitHub - containers/libpod: libpod is a library used to create container pods.
‘The Ostrich Problem’: Motivated Avoidance or Rejection of Information About Goal Progress

Monitoring one's current standing with respect to goals can promote effective self‐regulation. However, the present review suggests that there is an ostrich problem such that, in many instances, people have a tendency to “bury their head in the sand” and intentionally avoid or reject information that would help them to monitor their goal progress.

PG Phriday: PgBouncer or Bust | The Importance of Proxies

What is the role of PgBouncer in a Postgres High Availability stack?

DeepL Übersetzer
Inside the Fake Science Factories

This talk investigates fake science factories; international twilight companies whose sole purpose is to give studies an air of scientific credibility while cashing in on millions of dollars in the process.

The history behind "grep"'s name

g/regex/p -> /g/re/p -> grep

Principal–agent problem

The principal–agent problem, in political science and economics, occurs when one person or entity (the "agent") is able to make decisions and/or take actions on behalf of, or that impact, another person or entity (the "principal")

Blockchain study finds 0.00% success rate and vendors don't call back when asked for evidence • The Register

Though Blockchain has been touted as the answer to everything, a study of 43 solutions advanced in the international development sector has found exactly no evidence of success.

SuperMUC Results Report

In this results book, we would like to present this out- standing research, publishing more than 110 reports on projects carried out in 2016 and 20171. Our “TOP 5” pro- jects in terms of allocated core-hours consumed 17% of the total available core-hours on SuperMUC in this time- frame and merit special mention:

  1. Astrophysics: Janka et al. performed longtime 3D su- pernova simulations (page 32)
  2. Computational Fluid Dynamics and Engineering: Lohse et al. performed simulations on thermal turbulence at extreme Rayleigh numbers (page 108)
  3. High Energy Physics: Jansen et al. studied nucleon ob- servables as probes for physics beyond the standard model (page 202)
  4. Earth, Climate and Environmental Sciences: Ludwig et al. research climate change and hydrological extremes (page 185)
  5. Astrophysics: Dietrich et al. investigated binary neu- tron star mergers (page 18)