pegr writes: Over at TechDirt, we learn that, apparently, the rules of OpSec do not apply to LinkedIn. Using your favorite NSA spying project codename, search LinkedIn for analysts with specific experience with that project! The bonus is that you may very well learn the codenames of more projects. Lather, rinse, repeat.
Oh, and if the person you find didn't share their contact list, LinkedIn will help you find more by showing you "those that viewed this profile also viewed these:" Say what you will regarding the recent NSA revelations, but shouldn't there be a policy with regard to exposing intelligence projects and personnel on public forums? Do we really need to make it this easy for counter-intel of opposing nations?
pegr writes: Straight from Groklaw, the jury finds that Google is not guilty of infringing Oracle's Java patents. When the judge declares that APIs are not copyrightable, Oracle will walk away with nothing. So much for your billions of dollars in damages, Larry!
pegr writes: Andrew "bunnie" Huang, Reverse Engineer, XBox hacker, and generally smart guy, muses over the H1N1/swine flu virus as only a reverse engineer can: "I now know how to modify the virus sequence to probably make it more deadly." Not that he would, of course. bunnie has consistantly made the esoteric available to us mere mortals, and his overview of the H1N1 virus is a fascinating read from a unique perspective.