By John Gruber
WorkOS Radar:
Protect your app against AI bots, free-tier abuse, and brute-force attacks.
Jim Thompson:
Ellch and Maynor didn’t present a paper titled, “we can create a covert channel by having control of the software on both sides of a communication link” because its trivial to do so. Instead they did exacty that, but colored it so people would be mystified, perplexed and think that there was some new exploit buried deep in the 802.11 protocol, when, point-in-fact, there is not.
(Via Glenn Fleishman.)
★ Friday, 4 August 2006