@eachus @tqbf @newshtwit FWIW, here's an attack exploiting compression that doesn't rely on attacker-controlled data: http://www.cs.unc.edu/~fabian/papers/tissec2010.pdf …
-
-
@bascule@tqbf@newshtwit But I'm only speculating, not arguing.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@bascule@tqbf@newshtwit I think it's arguable that entropy of sound waves is very different from that of text.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@bascule@tqbf@newshtwit Yes, that uses the kind of "compression signature" I was originally referring to (but it was out of context then).Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.