NSA whistleblower Reality Winner may have been caught thanks to a hidden pattern of dots that color printers bury in every page they print, as an assistance to law enforcement agencies.
The existence of these dots was long-rumored, but it wasn't until 2005, when the Electronic Frontier Foundation broke the code on a Xerox printer's output, that the scope, method and capabilities of this technique came to light.
The Washington Post tells the exciting story of that technological forensic work, which still ripples through today.
Then, in October 2005, about a year after PC World’s story, a research team led by the Electronic Frontier Foundation cracked the code for one printer, the Xerox DocuColor. A technologist from the advocacy group, along with an intern and two volunteers, compared the dots on a series of test printouts submitted by supporters. They quickly deduced how to read the pattern.
As expected, the dots indicated the datge and time a page was printed, as well as the printer’s serial number. The foundation then installed a decoder program on its website that the public could use, and started publishing running lists of printers that did or did not display the dots.
How tech sleuths cracked the mysterious code that turns your printer into a spying tool
[Derek Hawkins/Washington Post]
Johns Hopkins Computer Science prof Professor Peter Fröhlich grades his students on a curve: the highest score on the final gets an A and everyone else is graded accordingly.
How about a whole album full of 11 excellent songs you’ve never heard before, which Joni wrote between 1964 and 1969 but never got around to recording.....sung by an excellent singer....with expert tasteful backup....including the first song she ever wrote, “Hunter,” which until now had appeared on a handful of early unreleased test-pressings of BLUE? Songs so good, they all sound like just-discovered outtakes from SONG TO A SEAGULL—which is basically what they are? How ‘bout, all this for only a sawbuck, US? (or $13 for a physical CD)
IoT Inspector is a new tool from Princeton's computer science department; it snoops on the traffic from home IoT devices and performs analysis to determine who they phone home to, whether they use encryption, and what kinds of data they may be leaking.
The web is an invaluable tool for connecting small businesses with their target audiences. However, when it comes to building a website and marketing online, the learning curve can be steep if you’re doing it on your own. The WordPress Essentials Lifetime Bundle can help you out by getting you up to speed with the platform […]
Most of us understand that when we visit a website, we’re subjecting ourselves to surveillance by trackers. And, while these tools are usually used for innocuous purposes, like determining which ads to show you, they can be leveraged for much more nefarious goals, and they have the potential to tank your browsing speed as well as […]
Learning how to code is a great way to improve your hiring potential and open the door to more lucrative careers, but getting the ball rolling can be a bit daunting considering the number of languages out there and steep price associated with training. However, the Pay What You Want: Learn to Code 2018 Bundle is […]