<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>techno.blog(&#34;Dion&#34;) &#187; Security</title>
	<atom:link href="http://almaer.com/blog/tag/security/feed" rel="self" type="application/rss+xml" />
	<link>http://almaer.com/blog</link>
	<description>blogging about life, the universe, and everything tech</description>
	<lastBuildDate>Tue, 28 Aug 2012 14:41:55 +0000</lastBuildDate>
	<generator>http://wordpress.org/?v=2.8.4</generator>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
			<item>
		<title>It&#8217;s just my email password&#8230;</title>
		<link>http://almaer.com/blog/its-just-my-email-password</link>
		<comments>http://almaer.com/blog/its-just-my-email-password#comments</comments>
		<pubDate>Thu, 20 Mar 2008 15:50:21 +0000</pubDate>
		<dc:creator>dion</dc:creator>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://almaer.com/blog/its-just-my-email-password</guid>
		<description><![CDATA[
I couldn&#8217;t help but interrupt someone at the coffee shop as I saw them giving their Gmail username and password into some random third party system to &#8220;grab your contacts&#8221;.
I get why sites have been doing this, but now we have the Google Contacts API there shouldn&#8217;t be the need.
What astounded me was the logic [...]]]></description>
			<content:encoded><![CDATA[<p><img src='http://almaer.com/blog/uploads/security.png' alt='Security' border='0'/></p>
<p>I couldn&#8217;t help but interrupt someone at the coffee shop as I saw them giving their Gmail username and password into some random third party system to &#8220;grab your contacts&#8221;.</p>
<p>I get why sites have been doing this, but now we have the <a href="http://code.google.com/apis/contacts/">Google Contacts API</a> there shouldn&#8217;t be the need.</p>
<p>What astounded me was the logic that this fellow used. He talked about how he used really good, different passwords, and never kept them in his email, so if the third party site was malicious they wouldn&#8217;t get anything good.</p>
<p>He didn&#8217;t seem to realize that by giving away the key to your email account, you are doing a LOT more than letting someone look at that email to your mum. With it, they have the keys to your <b>forgot password?</b> life. They can quickly go to accounts that you have all over the shop, simulate a forgotten password use case, and now they DO have access to your account info.</p>
<p>It isn&#8217;t about what is in your email before hand, it is the access to future email that matters.</p>
<p>This is why I was over the moon when the contacts API saw the light of day, and I hope to see all providers do similar work.</p>
]]></content:encoded>
			<wfw:commentRss>http://almaer.com/blog/its-just-my-email-password/feed</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Watching for the expiration of JavaScript domains</title>
		<link>http://almaer.com/blog/watching-for-the-expiration-of-javascript-domains</link>
		<comments>http://almaer.com/blog/watching-for-the-expiration-of-javascript-domains#comments</comments>
		<pubDate>Mon, 21 Jan 2008 05:06:20 +0000</pubDate>
		<dc:creator>dion</dc:creator>
				<category><![CDATA[Ajax]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://almaer.com/blog/watching-for-the-expiration-of-javascript-domains</guid>
		<description><![CDATA[The perl.com porn site redirect exploit isn&#8217;t new.
We tend to often trust the people that we load JavaScript from too much. So many new startups require you to just include that little tidbit of JavaScript. &#8220;Just copy and paste this somewhere on your blog&#8221;.
Of course, if the site gets compromised in anyway you are loading [...]]]></description>
			<content:encoded><![CDATA[<p>The <a href="http://ajaxian.com/archives/dangers-of-remote-scripting">perl.com porn site redirect exploit</a> isn&#8217;t new.</p>
<p>We tend to often trust the people that we load JavaScript from too much. So many new startups require you to just include that little tidbit of JavaScript. &#8220;Just copy and paste this somewhere on your blog&#8221;.</p>
<p>Of course, if the site gets compromised in anyway you are loading script from the Bad Guys. If you are a bad guy what are you doing? Looking for third parties that offer services that people embed, and watching like a hawk to see them mess up their DNS so you can pounce. You have automated systems to do this.</p>
<p>Watch out, and let&#8217;s get together to work out a <a href="code.google.com/p/google-caja/">possible</a> <a href="http://adsafe.org/">solution</a>, whether it be short term or longer.</p>
<p><img src="http://farm3.static.flickr.com/2241/2192450204_7b04613e25.jpg" border="0" /></p>
]]></content:encoded>
			<wfw:commentRss>http://almaer.com/blog/watching-for-the-expiration-of-javascript-domains/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
