Charles proxy is a web debugging proxy application for iOS.
https://www.charlesproxy.com/documentation/ios/
I hope this is simpler than running things in an emulator, or installing a TLS-breaking man-in-the-middle proxy on the wifi access point.
[protecting people by good design, solid security, efficient processes and trusted services]
Charles proxy is a web debugging proxy application for iOS.
https://www.charlesproxy.com/documentation/ios/
I hope this is simpler than running things in an emulator, or installing a TLS-breaking man-in-the-middle proxy on the wifi access point.
Fascinating paper: “The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets”, Nicholas Carlini, Chang Liu, Jernej Kos, Úlfar Erlingsson, Dawn Song at https://arxiv.org/abs/1802.08232
Turns out that your algorithm memorizes your secrets in the training data. -Even if the algorithm is a lot smaller than the actual secrets… – My jaw fell do the ground right here :
“The fact that models completely memorize secrets in the training data is completely unexpected: our language model is only 600KB when compressed , and the PTB dataset is 1.7MB when compressed. Assuming that the PTB dataset can not be compressed significantly more than this, it is therefore information-theoretically impossible for the model to have memorized all training data—it simply does not have enough capacity with only 600KB of weights. Despite this, when we repeat our experiment and train this language model multiple times, the inserted secret is the most likely 80% of the time (and in the remaining times the secret is always within the top10 most likely). At present we are unable to fully explain the reason this occurs. We conjecture that the model learns a lossy compression of the training data on which it is forced to learn and generalize. But since secrets are random, incompressible parts of the training data, no such force prevents the model from simply memorizing their exact details.”
The Better Crypto project aims to provide copy&paste crypto best practices for sysadmins for common setups, e.g. apache, iis, dovecot, etc..
https://bettercrypto.org/
There’s a PDF with easy copy&paste configurations at
https://bettercrypto.org/static/applied-crypto-hardening.pdf
v2.0 August 2014
https://www.dataprotection.ie/docimages/documents/GuidetoAuditProcessAug2014.pdf
“This guidance was originally published in 2009. This revised version has been updated to take account of legislative developments and to reflect any changes in the approach of the Office of the Data Protection Commissioner to the audit process. The guidance is designed to assist organisations selected for audit by the Office of the Data Protection Commissioner. It is hoped that
this resource will provide organisations holding personal data with a simple and clear basis to conduct a self-assessment of their compliance with their obligations under Irish Data Protection Law”
Decision No. 2011-316 dated 6 October 2011 adopting a standard for delivering privacy seals in audit procedures covering the protection of persons with regard to the processing of personal data
(which could be read as a good way to deliver a privacy audit – or to expect one being done on you following this procedure)
https://www.cnil.fr/sites/default/files/atoms/files/referentiel_audit_en.pdf
Interesting case – data breach due to ticket ID enumeration in a standard software URL (developed by a service provider) – CNIL sanctions data controller.
https://www.cnil.fr/fr/darty-sanction-pecuniaire-pour-une-atteinte-la-securite-des-donnees-clients