Profile

Cover photo
David Moore
Works at Cisco Systems, Inc.
Attends University of California, San Diego
285 followers|19,983 views
AboutPostsPhotosVideos

Stream

 
Win.
 
Wah, why do there have to be only seven chapters of the Harry Potter/Culture crossover fanfic? :( ;_;

https://www.fanfiction.net/s/3983128/1/Culture-Shock <- the starting chapter.  If you're a Culture fan and familiar with Harry Potter, you'll want to read them all!  But there are only seven :/
1
1
Julian Morley's profile photo
Add a comment...

David Moore

Shared publicly  - 
 
Orange chicken and crispy beef. 5 stars.
1
Add a comment...

David Moore

Shared publicly  - 
 
Raise them right.
 
Awesome...
5
Add a comment...

David Moore

Shared publicly  - 
 
Time to make the donuts. Er, I mean any passwords with overlap with any password used on a google, Facebook, LinkedIn, Twitter, yahoo, etc service over the past several years. Unfortunately only google is encrypting all inter-data center traffic now, as far as we publicly know.
 
The packet capture shown in these new NSA slides shows internal database replication traffic for the anti-hacking system I worked on for over two years. Specifically, it shows a database recording a user login as part of this system:

http://googleblog.blogspot.ch/2013/02/an-update-on-our-war-against-account.html

Recently +Brandon Downey, a colleague of mine on the Google security team, said (after the usual disclaimers about being personal opinions and not speaking for the firm which I repeat here) - "fuck these guys":

https://plus.google.com/108799184931623330498/posts/SfYy8xbDWGG

I now join him in issuing a giant Fuck You to the people who made these slides. I am not American, I am a Brit, but it's no different - GCHQ turns out to be even worse than the NSA.

We designed this system to keep criminals out. There's no ambiguity here. The warrant system with skeptical judges, paths for appeal, and rules of evidence was built from centuries of hard won experience. When it works, it represents as good a balance as we've got between the need to restrain the state and the need to keep crime in check. Bypassing that system is illegal for a good reason.

Unfortunately we live in a world where all too often, laws are for the little people. Nobody at GCHQ or the NSA will ever stand before a judge and answer for this industrial-scale subversion of the judicial process. In the absence of working law enforcement,  we therefore do what internet engineers have always done - build more secure software. The traffic shown in the slides below is now all encrypted and the work the NSA/GCHQ staff did on understanding it, ruined.

Thank you Edward Snowden. For me personally, this is the most interesting revelation all summer.
1
Add a comment...

David Moore

Shared publicly  - 
 
At least Google is rapidly moving to make it harder for spy agencies to tap communications. http://articles.washingtonpost.com/2013-09-06/business/41831756_1_encryption-data-centers-intelligence-agencies
 
Following up on this story, it's clear that Google's worries were substantive.  The NSA has been sniffing Google (and Yahoo! and other) traffic and the previously disclosed plan ( http://www.washingtonpost.com/business/technology/google-encrypts-data-amid-backlash-against-nsa-spying/2013/09/06/9acc3c20-1722-11e3-a2ec-b47e45e6f8ef_story.html ) to encrypt that was clearly necessary.

My favorite quote:  "Two engineers with close ties to Google exploded in profanity when they saw the drawing."

So, to sum up:  the NSA are bad.  Google and others are working to prevent them from being effective at their invasive activities.  This story is not yet done.
2
David Moore's profile photoTodd Moore's profile photo
2 comments
 
I can neither confirm nor deny that we have a floating data center being constructed in San Francisco Bay which will be deployed to international waters. Any ocean-based wind farm developments by Google (http://mobile.businessweek.com/news/2013-10-24/google-backed-atlantic-cable-shifts-to-new-jersey-as-wind-stalls) are coincidental. Rumors that Google is deploying more undersea fiber for data than all other telecom providers combined is surely an unfounded rumor.

Sharks with lasers. Yeah, we have those. 
Add a comment...

David Moore

Shared publicly  - 
 
Viz porn for the day.
 
The Digital Attack Map (http://goo.gl/z61QWH) is a live data visualization, built through a collaboration between Arbor Networks and +Google Ideas, that maps “distributed denial of service” (DDoS attacks) designed to take down websites around the globe. Many websites face targeted digital attacks by people who aim to silence their speech. This tool and visualization specifically surfaces anonymous traffic data related to these attacks, letting people explore historic trends and see related news reports of outages happening on a given day. 

#ideassummit  
2
Add a comment...
Have him in circles
285 people
Eric Enriquez's profile photo
Richard Albritton's profile photo
Tulin Shannon's profile photo
Robert Novak's profile photo
Bradley Huffaker's profile photo

David Moore

Shared publicly  - 
 
It's good to be on the inside.
 
Ha! I've been saying this for years!

https://plus.google.com/u/0/+J%C3%BCrgenHubert/posts/4Yodu54kZXR

And I also noticed the similarities after reading Sudhir Venkatesh's work...
1
Add a comment...

David Moore

Shared publicly  - 
 
iOS 7 music app is way less useful than the iOS 6 one, at least for my usage style.

The older repeat, repeat-single, normal play icon was easy to see and toggle. Now it is text menu that is hard to see at a glance and requires reading and coordination to pick from menu, rather than just tapping to cycle through.

Adding icons to the playlist screen might be useful, except that the size of the icons has significantly shrunk the number of entries visible at one time, requiring more scrolling and searching.

Inability to get to music app via the double press of home button really sucks. The slide-up from bottom settings panel doesn't have a good consistent way to get to the app.

I would rather have buttons for "songs" in the bottom bar than either radio or genius.

#ios7 #ios7problems
1
Add a comment...

David Moore

Shared publicly  - 
 
Remember to regularly change all passwords on systems like yahoo, google, Facebook, amazon, Twitter, LinkedIn, etc. All of these services replicate data between sites for fault-tolerance and performance. So far only google has announced that they are encrypting traffic on these links (recently in place after over year of planning and execution).

The amount of disk space to hold login names and list of all snooped password hashes is cheap.

That data is always available to them even if their ability to tap is reduced. They'd be able to login to specifically targeted accounts.
 
The packet capture shown in these new NSA slides shows internal database replication traffic for the anti-hacking system I worked on for over two years. Specifically, it shows a database recording a user login as part of this system:

http://googleblog.blogspot.ch/2013/02/an-update-on-our-war-against-account.html

Recently +Brandon Downey, a colleague of mine on the Google security team, said (after the usual disclaimers about being personal opinions and not speaking for the firm which I repeat here) - "fuck these guys":

https://plus.google.com/108799184931623330498/posts/SfYy8xbDWGG

I now join him in issuing a giant Fuck You to the people who made these slides. I am not American, I am a Brit, but it's no different - GCHQ turns out to be even worse than the NSA.

We designed this system to keep criminals out. There's no ambiguity here. The warrant system with skeptical judges, paths for appeal, and rules of evidence was built from centuries of hard won experience. When it works, it represents as good a balance as we've got between the need to restrain the state and the need to keep crime in check. Bypassing that system is illegal for a good reason.

Unfortunately we live in a world where all too often, laws are for the little people. Nobody at GCHQ or the NSA will ever stand before a judge and answer for this industrial-scale subversion of the judicial process. In the absence of working law enforcement,  we therefore do what internet engineers have always done - build more secure software. The traffic shown in the slides below is now all encrypted and the work the NSA/GCHQ staff did on understanding it, ruined.

Thank you Edward Snowden. For me personally, this is the most interesting revelation all summer.
2
David Moore's profile photoIan McCloghrie's profile photo
2 comments
 
Good point. Maybe just a reminder to avoid sharing between sites and that for most web browsers there are password managers that can help with that.

Also: if someone offers 2-factor authentication, take it.
Add a comment...

David Moore

Shared publicly  - 
 
Video explains how moderate, non-radical Muslims (living in Norway) all believe in sharia law, subjugation of women, etc. Strangely this demonstration is in response to audience question about why the media portrays Islam in a bad light.

 
I don't think "moderate" means what these "moderate Muslims" think it means....
#humanism   #equality  
1
Add a comment...

David Moore

Shared publicly  - 
 
The fully operational
death flower is particularly nice touch.
 
Darth Fairy finds your lack of faith disturbing and will enforce her will with the Death Star wand.

Tutorial and pictures from http://blog.booturtle.com/2010/09/day-darth-fairy-went-to-town.html and more fabulous costumes at http://www.amightygirl.com/blog?p=4818
3
Add a comment...

David Moore

Shared publicly  - 
 
Finally watched this. Holy crap.
 
The GOP's little rule change they hoped you wouldn't notice
1
1
Michel Llopiz's profile photo
Add a comment...
People
Have him in circles
285 people
Eric Enriquez's profile photo
Richard Albritton's profile photo
Tulin Shannon's profile photo
Robert Novak's profile photo
Bradley Huffaker's profile photo
Education
  • University of California, San Diego
    present
Work
Employment
  • Cisco Systems, Inc.
    present
Basic Information
Gender
Male