Bookmarks for July 17th from 08:18 to 09:36

by danhon

This is an auto-posted collection of my public links posted to for July 17th from 08:18 to 09:36:

  • Our manifesto – The ODI – Our six manifesto points will help us to achieve our vision: we want people, organisations and communities to use data to make better decisions and be protected from any harmful impacts
  • Our Strategy – The ODI – “We want people, organisations and communities to use data to make better decisions and be protected from any harmful impacts.”
  • Disaster Response for Nonprofits & NGOs – “The AWS Disaster Response Action Team allows customers to focus on mission-critical functions, while AWS provisions critical data and applications, transports hardware to the base of operations, and implements deployable infrastructure based on customer need.”
  • AWS Snowball Edge – Petabyte-Scale Data Transport with Compute – “AWS Snowball Edge is a data migration and edge computing device with 100TB of capacity and support for computing tasks via Amazon EC2 applications or AWS Lambda functions. Customers use these devices to collect, process and store data in environments with intermittent connectivity (such as manufacturing, industrial, and transportation) or in extremely remote locations (such as military or maritime operations) before shipping it back to AWS. These devices may also be rack mounted and clustered together to build larger, temporary installations.” Ok you can call it that but let’s just agree that this is a remote transportable node for The Machine/Northern Lights.
  • Humanitarian OpenStreetMap Team | Fast, Powerful, and Practical: New Technology for Aerial Imagery in Disaster Response – The AWS Snowball Edge allows prospective users of these tools to “create a job” (in AWS parlance) after a disaster strikes, which will provision a 100TB ruggedized device with content from S3 buckets–large volumes of satellite imagery showing pre- and post-event conditions. The AWS Snowball Edge will then be shipped out by AWS and can be further transported by other means (I checked the Snowball Edge on my flight from Oregon to Dulles). Once on-site, all that’s needed is to connect to power and a local network. A generator and and a mesh network (no internet connectivity necessary) would suffice.
  • Strengths Become Vulnerabilities: How a Digital World Disadvantages the United States in Its International Relations – Lawfare – “[constituent] elements of U.S. society—a commitment to free speech, privacy and the rule of law; innovative technology firms; relatively unregulated markets; and deep digital sophistication—create asymmetric vulnerabilities that foreign adversaries, especially authoritarian ones, can exploit. These asymmetrical vulnerabilities might explain why the United States so often appears to be on the losing end of recent cyber operations and why U.S. attempts to develop and implement policies to enhance defense, resiliency, response or deterrence in the cyber realm have been ineffective.”
  • [1806.10189] Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry – “Specifically, we introduce Thermanator, a new post factum insider attack based on heat transfer caused by a user typing a password on a typical external keyboard. We conduct and describe a user study that collected thermal residues from 30 users entering 10 unique passwords (both weak and strong) on 4 popular commodity keyboards. Results show that entire sets of key-presses can be recovered by non-expert users as late as 30 seconds after initial password entry, while partial sets can be recovered as late as 1 minute after entry. Furthermore, we find that Hunt-and-Peck typists are particularly vulnerable.”