More Thoughts on Security and the Internet of Things

Attacks that are initially restricted to the realm of esoteric, government-backed spooks become accessible over time to run-of-the-mill cybercriminals. Take, for example, the Linux.Darlloz worm, which attacks embedded devices and is interesting for a couple of reasons. First, it propagates by exploiting a vulnerability that was patched in May 2012. But the firmware images on many embedded devices are much older than that. The second reason I find it particularly interesting is it targets PHP, a scripting language largely used for web development.

Google Is Feeling Creepy

When you enable location access, Android says Allow Google’s location service to collect anonymous location data. Some data may be stored on your device. Collection may occur even when no apps are running. This seems both fair and harmless, so I didn’t think too much about it. But it turns out to be a little creepier than you might think.

Using Windows Movie Maker With the Kodak Zi8

In a previous blog post, I mentioned I had a Kodak Zi8 video camera. This past weekend, I decided I wanted to try Windows Movie Maker (WMM) to edit videos produced with it, instead of the built-in Arcsoft MediaImpression software that the camera installs on the PC it is connected to. (Although I haven’t tested…

The H.264 Sequence Parameter Set

This is a follow-up to my World’s Smallest H.264 Encoder post. I’ve received several emails asking about precise details of things in two entities in the H.264 bitstream: the Sequence Parameter Set (SPS) and the Picture Parameter Set (PPS). Both entities contain information that an H.264 decoder needs to decode the video data, for example,…