1 Raindrop

Gunnar Peterson's loosely coupled thoughts on distributed systems, security, and software that runs on them.

Recent Posts

  • Security Champions Guide to Web Application Security
  • Security > 140 Conversation with Pamela Dingle on Identity
  • 6 Things I Learned from Robert Garigue
  • The Curious Case of API Security
  • Security Capability Engineering
  • Ought implies can
  • Security > 140 Chat with T. Rob Wyatt on MQ and Middleware Security
  • Privilege User Management Bubble?
  • The part where security products solve the problem
  • Four Often Overlooked Factors to Give Your Security Team a Fighting Chance

Blogroll

  • Adding Simplicity - An Engineering Mantra
  • Adventures of an Eternal Optimist
  • Andy Steingruebl
  • Andy Thurai
  • Anton Chuvakin
  • Beyond the Beyond
  • cat slave diary
  • Ceci n'est pas un Bob
  • ConnectID
  • Cryptosmith
  • Emergent Chaos: Musings from Adam Shostack on security, privacy, and economics
  • Enterprise Integration Patterns: Gregor's Ramblings
  • Financial Cryptography
  • infosec daily: blogs
  • Jack Daniel
  • James Kobielus
  • James McGovern
  • John Hagel
  • Justice League [Cigital]
  • Kim Cameron's Identity Weblog
  • Krypted - Charles Edge's Notes from the Field
  • Lenny Zeltser
  • Light Blue Touchpaper
  • Mark O'Neill
  • Off by On
  • ongoing
  • Patrick Harding
  • Perilocity
  • Pushing String
  • Rational Survivability
  • rdist: setuid just for you
  • RedMonk
  • RiskAnalys.is
  • Rudy Rucker
  • Software For All Seasons
  • Spire Security Viewpoint
  • TaoSecurity
  • The New School of Information Security
  • Windley's Technometria
  • zenpundit
Blog powered by Typepad

Outsourced CAPTCHA Circumvention

Slashdot (what would Lou Dobbs say?):

"Captchas are a nice idea to protect your blog or guestbook from being spammed by robots. But what good is this protection when you can hire "data entry specialists" to solve captchas for $0.60 per hour for 50 hours a week? Anyone here who can think up a solution that does not include drastically changing the global economy? How about captchas that require cultural background knowledge to solve?"

Who won the world series in 1973?

September 06, 2006 in Chinese Farmers, Computer Security, Security, Software Architecture | Permalink | Comments (2)

Chinese Farmer Metrics

Chinese farmers are an interesting trend that encompasses both virtualization and globalization. Worldchanging, as usual, understands this nexus as well as anyone:

Chinese farmers may be on the cutting-edge of the global economy. But not the Chinese farmers you're probably imagining -- rural agriculturalists in the Middle Kingdom. The Chinese farmers I'm talking about sit in front of computer screens for hours on end, killing video game monsters online, over and over again.
...
People looking for an advantage (or simply pressed for time, and wishing to keep up with peers) will pay surprisingly large amounts of actual money for bits of virtual currency or rare items. And although nearly every MMORPG prohibits such sales, auctions of virtual gear can amount to millions of dollars every year.

According to the NYT, there are over 100,000 young people employed in China generating virtual currency. This example of mapping virtual economies onto "real" economies can inform the emerging discipline of security metrics. Metrics that value and classify assets should consider the intrinsic value from a number of different viewpoints. In other words the intrinsic value of, say, an Oracle database  can vary from stakeholder to stakeholders the context of what the stakeholder uses it for is what determines the value. The value of the node by itself is not the same as the node functioning as a dependency in transcation depending on the data, what it is used for and who uses it.

NYT:

On eBay, for example, 100 grams of World of Warcraft gold is available for $9.99 or two über characters from EverQuest for $35.50. It costs $269 to be transported to Level 60 in Warcraft, and it typically takes 15 days to get the account back at the higher level.

It appears we are not only outsourcing IT, but kids are outsourcing playing video games, what would Steven Johnson say?

December 13, 2005 in Chinese Farmers, Economics, Security Metrics | Permalink | Comments (0)

My Photo

SOS: Service Oriented Security

  • The Curious Case of API Security
  • Getting OWASP Top Ten Right with Dynamic Authorization
  • Top 10 API Security Considerations
  • Mobile AppSec Triathlon
  • Measure Your Margin of Safety
  • Top 10 Security Considerations for Internet of Things
  • Security Checklists
  • Cloud Security: The Federated Identity Factor
  • Dark Reading IAM
  • API Gateway Secuirty
  • Directions in Incident Detection and Response
  • Security > 140
  • Open Group Security Architecture
  • Reference Monitor for the Internet of Things
  • Don't Trust. And Verify.

Archives

  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015

More...

Subscribe to this blog's feed