6 comments

  • dataflow an hour ago

    How do you prevent this from being trivially defeated by getting multiple copies of the list and intersecting them?

  • varun_ch 5 hours ago

    This reminds me of some ways Microsoft used to try catching/dissuading leakers. If someone could find a source for these..

    The Xbox 360's dashboard used to have 'aesthetic' rings that actually encoded your serial number, so they could catch leakers

    I think I remember hearing somewhere (maybe Dave's Garage) about beta builds of Windows using intricate patterns as wallpapers to trick people into thinking it was also a leak prevention measure.

    • morkalork 4 hours ago

      The wildest one I remember is emails with different whitespace encoded characters that Id the recipient. No idea if true tho

  • rdevilla 6 hours ago

    As the article states, it's an older practice so this maybe goes without saying - canary traps are also useful for tracking the flow of information throughout a population.

    A well crafted, bespoke whisper passed into one ear that returns to you from another direction is a very strong signal.

  • JumpCrisscross 3 hours ago

    Does anyone have a link to a knowledgeable summary of the political situation in Edmonton?

  • aaron695 3 hours ago

    [dead]