Why care about spherical trig?

Last spring I wrote a post on spherical trigonometry, the study of triangles drawn on a sphere (e.g. the surface of the Earth). Mel Hagen left a comment on that post a few days ago saying I am revisiting Spherical Trig after 30 years by going back over some of my books that I have […]

Why 90% solutions may beat 100% solutions

I’ve never written a line of Ruby, but I find Ruby on Rails fascinating. From all reports, the Rails framework lets you develop a website much faster than you could using other tools, provided you can live with its limitations. Rails emphasizes consistency and simplicity, deliberately leaving out support for some contingencies. I listened to […]

Why Unicode is subtle

On its surface, Unicode is simple. It’s a replacement for ASCII to make room for more characters. Joel Spolsky assures us that it’s not that hard. But then how did Jukka Korpela have enough to say to fill his 678-page book Unicode Explained? Why is the Unicode standard 1472 printed pages? It’s hard to say anything pithy about […]

Weak encryption and surveillance

Two of the first things you learn in cryptography are that simple substitution ciphers are very easy to break, and that security by obscurity is a bad idea. This post will revisit both of these ideas. Security depends on your threat model. If the threat you want to protect against is a human reading your […]

Database reconstruction attacks

In 2018, three researchers from the US Census Bureau published a paper entitled “Understanding Database Reconstruction Attacks on Public Data.” [1] The article showed that private data on many individuals could be reverse engineered from public data. As I wrote about a few days ago, census blocks are at the bottom of the US Census […]

Data Privacy FAQ

Table of Contents 1. General data privacy questions 1.1. What’s wrong with the nothing-to-hide argument? 1.2. Does removing names make data deidentified? 2. HIPAA, Expert Determination, and Safe Harbor 2.1. Is there more to Safe Harbor than 18 rules? 2.2. Does Safe Harbor really protect privacy? 2.3. Why does Safe Harbor remove dates of service? […]