Swipe to Unlock: The Primer on Technology and Business Strategy
Rate it:
Open Preview
33%
Flag icon
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers…
33%
Flag icon
Bitcoin isn’t part of the dark web — it’s an independent technology with plenty of legitimate uses.
33%
Flag icon
In short, none of these technologies
33%
Flag icon
Bitcoin, Tor, the dark web — are illegal. Many illegal activities use these technologies, but we can use them for good too.
33%
Flag icon
though your information is encrypted between your computer and the server, the server can decrypt your information and read it.[648]
33%
Flag icon
Amazon can’t charge your credit card unless it can decrypt and read your credit card number.
34%
Flag icon
Since iOS 8, an iPhone doesn’t just check that the password you entered matches the stored password. It mashes up the password you enter with a 256-bit code
34%
Flag icon
(called a UID)
34%
Flag icon
This mashup, or “hash,” can’t be reverse-engineered, so there’s no way to get in without knowing the stored password.[671]
34%
Flag icon
you don’t know the password to a phone, your only option is to randomly guess passwords, also known as
34%
Flag icon
brute forcing.[672]
34%
Flag icon
Apple refused, saying that being forced to write code would violate the company’s free-speech rights.[677]
34%
Flag icon
How could a phony Wi-Fi network help someone steal your identity?
34%
Flag icon
phony Wi-Fi
35%
Flag icon
Hold on, you might be thinking. Doesn’t HTTPS encrypt all communications? That’s true. If your connection uses HTTPS, the hacker won’t be able to understand any information you’re sending, and you’ll be safe.[687] But there’s a catch.
35%
Flag icon
In 2009, a researcher released a tool called
35%
Flag icon
SSLStrip,[688]
35%
Flag icon
which lets an attacker fool your computer into talking with a server over HTT...
This highlight has been truncated due to consecutive passage length restrictions.
35%
Flag icon
SSLStrip attack:
35%
Flag icon
SSLStrip,
35%
Flag icon
This is what’s called
35%
Flag icon
“man-in-the-middle” attack.[695]
35%
Flag icon
man-in-the-middle attacks,
35%
Flag icon
hackers could impersonate you to e-commerce sites, email, social networks, and the like — which could be devastating.[696]
35%
Flag icon
VPN,
35%
Flag icon
virtual private network.
35%
Flag icon
Technologists often say that VPNs create a direct, secure “tunnel” between you and websites.[700]
35%
Flag icon
Well, if a hacker got you to connect to their network and used
35%
Flag icon
SSLStrip,
35%
Flag icon
they coul...
This highlight has been truncated due to consecutive passage length restrictions.
35%
Flag icon
man-in-the-middl...
This highlight has been truncated due to consecutive passage length restrictions.
35%
Flag icon
to get your passwords and other identifyi...
This highlight has been truncated due to consecutive passage length restrictions.
35%
Flag icon
VPN.
36%
Flag icon
Each 1 or 0 is called a bit. Bits are too small to be of much use on their own, so we usually measure data in bytes,
36%
Flag icon
A kilobyte (KB) is a thousand bytes,
36%
Flag icon
megabyte (MB) is a million bytes,
36%
Flag icon
gigabyte (GB) is a billion ...
This highlight has been truncated due to consecutive passage length restrictions.
36%
Flag icon
CPU:
36%
Flag icon
i3, i5, i7, and i9.[723]
36%
Flag icon
So what’s the best CPU? It depends on what you need. The more powerful your CPU, the more it costs and the faster your battery drains.[725] So if you’re just browsing Facebook and sending emails, you don’t need a mighty CPU, just like you don’t need a Ferrari if all you do is drive to the grocery store and back.
36%
Flag icon
two major types of CPU chips:
36%
Flag icon
ARM and Intel.
36%
Flag icon
Apple announced MacBooks would switch from Intel to ARM in 2020.[727]
37%
Flag icon
newer solid-state drive (SSD), which has no moving parts but instead stores information in a huge grid of tiny boxes, called “cells.”[732]
37%
Flag icon
“flash memory,”
37%
Flag icon
hard drives need to spin around a moving disc to find information
37%
Flag icon
SSDs just need to send pulses of electricity,
37%
Flag icon
flash memory is small, energy-efficient, and resistant to getting dropped, which are all very useful to have in mobile devices.[748]
37%
Flag icon
Tradeoffs
38%
Flag icon
“planned obsolescence”.[763]
1 5 10