From a paper being presented at the SecureComm conference in Italy by Tom Chothia and colleagues at the University of Birmingham, which investigate how users who participate in BitTorrent swarms for popular files are likely to have their IP addresses logged by monitoring companies within three hours.
Two weird examples of photo manipulation that aims at converting an “innocent” image into something erotic or pornographic in nature: (1) The now old “mormon porn” strategy, which consists in adding circular bubbles on an image in order to make people focus on certain aspects, (2) The pixellation technique, that the…