Profile

Cover photo
Phillip Marlow
134 followers|180,069 views
AboutPostsPhotosVideos

Stream

Phillip Marlow

Shared publicly  - 
 
 
If you use intents properly then many of your app's permission requests aren't needed!
Permissions on Android are tricky to get right from a user perspective. Usually you only want to do something minor and innocuous (pre-fill a form with a contact's info) but the actual permission you have to request gives you much...
4
Add a comment...

Phillip Marlow

Shared publicly  - 
 
This looks very interesting.
 
End-to-end encryption for Gmail. Released first as open source code so it can be vetted by the security community for vulnerabilities, then to the general public as an extension. I like the approach.
1
Add a comment...

Phillip Marlow

Shared publicly  - 
 
The Night Watch

Are you a systems programmer?  Do you work with a systems programmer?  Did you take Computer Systems in college?  Are you concerned about the composition of your post-apocalypse gang?  Then read this paper by +James Mickens.  Actually read it even if you only have a passing familiarity with programming, you'll still love it.

"As a highly trained academic researcher, I spend a lot of time trying 
to advance the frontiers of human knowledge. However, as someone who was born in the South, I secretly believe that true progress is 
a fantasy, and that I need to prepare for the end times, and for the chickens coming home to roost, and fast zombies, and slow zombies, and the polite zombies who say "sir" and "ma’am” but then try to eat your brain to acquire your skills."  Click the link to read more.

h/t to David from popehat.com
1
Bill Phillip Marlow's profile photo
 
LMFAO!
Add a comment...

Phillip Marlow

Shared publicly  - 
 
Last night +NASA launched ORS-3 carrying TJ3Sat, the first satellite designed and built by high school students to be put into orbit.  It was great fun watching the launch.  Keep your antennas pointed at the sky listening for KK4PHU.  Go TJ!

cc: +TJHSST Alumni 
1
Bill Phillip Marlow's profile photoJenny Woodman's profile photo
2 comments
 
Hey, I'm doing a summer internship at NASA writing for Earthzine. I am currently writing an article about cubesats and would love to use these images. Would you be willing to share them (you would be credited for the images)?
Add a comment...

Phillip Marlow

Shared publicly  - 
 
+Allie Brosh wrote a book!  Which Amazon tells me is in excess of 288 pages.

If you don't know about Allie - what part of the internet have you been hiding in?  She's the amazing person behind hyperboleandahalf.com  (blogger redirect).

PS: Allie - If I do sneaky marketing for you like this, will you sign a book for me? :)

http://hyperboleandnineeighths.blogspot.com/
http://www.amazon.com/Hyperbole-Half-Unfortunate-Situations-Mechanisms/dp/1451666179
3
Add a comment...

Phillip Marlow

Shared publicly  - 
 
Steering the bandwagon

So apparently there's some news story or something...?  Something about +Verizon Wireless , +Google , +Yahoo! , and a few others?  Something about data privacy?

It's almost certainly people supporting the widespread and consistent use of end-to-end encryption ( #E2EE ), right?  Well, even if it isn't, it's still a good thing to do.

Are you worried that your email is out there for criminals, corporations, governments, and your next door neighbor to read?  Start using a strong encryption solution like #PGP to protect yourself.

How about your text messages?  Maybe a solution like +Protected Mobility's ProtectedSMS ( https://play.google.com/store/apps/details?id=com.pm.sms ) would help.

It's easy to do.  Encrypt your data all the way to the recipient today.  Your mom, brother, girlfriend, husband, and best friend will all appreciate your thoughtfulness.   And you'll be more safe too.


-----BEGIN PGP MESSAGE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=rZf5
----END PGP MESSAGE----
 
Dear Google users—

You may be aware of press reports alleging that Internet companies have joined a secret U.S. government program called PRISM to give the National Security Agency direct access to our servers. As Google’s CEO and Chief Legal Officer, we wanted you to have the facts.

First, we have not joined any program that would give the U.S. government—or any other government—direct access to our servers. Indeed, the U.S. government does not have direct access or a “back door” to the information stored in our data centers. We had not heard of a program called PRISM until yesterday.

Second, we provide user data to governments only in accordance with the law. Our legal team reviews each and every request, and frequently pushes back when requests are overly broad or don’t follow the correct process. Press reports that suggest that Google is providing open-ended access to our users’ data are false, period. Until this week’s reports, we had never heard of the broad type of order that Verizon received—an order that appears to have required them to hand over millions of users’ call records. We were very surprised to learn that such broad orders exist. Any suggestion that Google is disclosing information about our users’ Internet activity on such a scale is completely false. 

Finally, this episode confirms what we have long believed—there needs to be a more transparent approach. Google has worked hard, within the confines of the current laws, to be open about the data requests we receive. We post this information on our Transparency Report whenever possible. We were the first company to do this. And, of course, we understand that the U.S. and other governments need to take action to protect their citizens’ safety—including sometimes by using surveillance. But the level of secrecy around the current legal procedures undermines the freedoms we all cherish.

Posted by Larry Page, CEO and David Drummond, Chief Legal Officer
Dear Google users— You may be aware of press reports alleging that Internet companies have joined a secret U.S. government program called PRISM to give the National Security Agency direct access to our servers. As Google’s CE...
1
Bill Phillip Marlow's profile photo
 
Excellent post and ideas...I would add using a VPN (Witopia / Hidemyass, etc) or TOR (https://www.torproject.org/) when surfacing the web.

WE THE PEOPLE - have protected ourselves since the beginning of our country and we can still do it in this electronic world.
Add a comment...
Have him in circles
134 people
Steven Tan's profile photo
Cameron Johnson's profile photo
JuanC Gonzalez's profile photo
aaron mullahoo's profile photo
Christopher Rodgers's profile photo
Russell Holly's profile photo
Natalie Lubsen's profile photo
Randy Stiefer's profile photo
TJHSST Alumni's profile photo

Phillip Marlow

Shared publicly  - 
 
PHD Comics Movie 2

So you know how I only recommend amazing things, like the Obduction Kickstater or the Hyperbole and a Half book?  I've got another one for you: The PHD Comics Movie is getting a sequel!  The first one was amazing and you can watch it at http://phdmovie.com/ if you need incentive to pledge.  For just $6, you get to stream the movie when it comes out, and we inch that much closer to a longer/better movie.  Move fast though - the Kickstarter closes on Friday morning.

https://www.kickstarter.com/projects/1831998591/the-phd-movie-2-still-in-grad-school?ref=nav_search
A sequel to the independently-produced movie based on PHD Comics, about life (or the lack thereof) in Academia.
1
Add a comment...

Phillip Marlow

Shared publicly  - 
 
A taste of +Red Hat Summit 2014.

TL;DA (Too Long; Didn't Attend?): Cloud + Containers.
1
Bill Phillip Marlow's profile photo
 
Awesome!
Add a comment...

Phillip Marlow

Shared publicly  - 
 
Earning #GeekCred by interpreting "brush up on networking" to mean "read the RFCs". Extra points for standards written 10 years before I was born.

Fun fact: RFC 793 handles original SYN.
1
Bill Phillip Marlow's profile photo
 
Too Funny! 
Add a comment...

Phillip Marlow

Shared publicly  - 
 
The People Behind Myst Do Kickstarter

http://www.kickstarter.com/projects/cyaninc/obduction

+Cyan and +Rand Miller are at it again.  Sadly it isn't more Myst, but it is an entirely new world which is a spiritual successor to Myst.  It's called Obduction, and is currently raising funds on +Kickstarter.

Here's 10 reasons you ought to chip in a few bucks to make it happen:
1. You like puzzles.
2. You like puzzles that keep you up all night.
3. You appreciate an immersive world.
4. Beautiful games make you happy.
5. You like to explore, even if it means changing between 5 CDs.
6. It doesn't mean even 1 CD (aka digital copies).
7. You're excited to see a game based on Unreal Engine 4.
8. You're a little tired of trying to run Windows 95/98 so you can play Myst and Riven.
9. You like easter eggs.
10. The ending has not yet been written.
1
Add a comment...

Phillip Marlow

Shared publicly  - 
 
The User IS the Enemy

Is the title of a great paper by +Stuart Schechter.  I highly recommend it to everyone who shares my special taste for technical research which includes Dr. Seuss quotes.  Also people who have ever interacted with children before, or who enjoy a good computer security pun.

http://research.microsoft.com/apps/pubs/?id=194484

h/t to Bruce Schneier (http://www.schneier.com/blog/archives/2013/07/security_analys_4.html)
Children represent a unique challenge to the security and privacy considerations of the home and technology deployed within it. While these challenges posed by children have long been researched, there is a gaping chasm between the traditional approaches technologists apply to problems of ...
1
Add a comment...

Phillip Marlow

Shared publicly  - 
 
Google I/O 2013
Tue, May 14, 2013, 5:00 PM
1
People
Have him in circles
134 people
Steven Tan's profile photo
Cameron Johnson's profile photo
JuanC Gonzalez's profile photo
aaron mullahoo's profile photo
Christopher Rodgers's profile photo
Russell Holly's profile photo
Natalie Lubsen's profile photo
Randy Stiefer's profile photo
TJHSST Alumni's profile photo
Basic Information
Gender
Male
Story
Tagline
At the cutting edge of awesome
Introduction
Computer geek, SCUBA diver, hiker, ham radio operator, and cook.
Links