Security

"Security Practices"
GIS security guidelines
Security Flaws
Security Threats
SQL injections
JavaScript injections
end-to-end encryption
computer forensics
computer security training services
www.pcworld.com
minor annoyance vs major catastrophe

    https://www.troyhunt.com/our-password-hashing-has-no-clothes/
Tor
Psiphon
Lantern

Open Whisper Systems
Signal

* DNS Poisoning
* BGP Hijacking
attack vector
-------------------
authentication
authorization
-------------------
simple login
credential vs. token

federated
SSO

    .NET      Java (JVM)
    OWIN      Java Servlet / Servlet Containers

OAuth
token based authentacation
---------------------
Hotel Key Card Analogy
---------------------
xor^-1(0) = xor(0, 0) = xor(1, 1)      1 bit -> 2 input
xor^-1(1) = xor(1, 0) = xor(0, 1)      1 bit -> 2 input

(00) = xor(00, 00) = (11 11) = (10, 10) = (01, 01)
(01)
(10)
(11)
2 bit -> 4 input

n bits -> 2^n variations -> (2^n)^2 possibilities
8 bits -> 256 variations
3 bits -> 8 variations  -> 64 possibilities