Ben Laurie

Last updated
Ben Laurie
Ben laurie.jpg
Laurie in December 2007
OccupationSoftware engineer

Ben Laurie is an English software engineer. Laurie wrote Apache-SSL, [1] the basis of most SSL-enabled versions of the Apache HTTP Server. He developed the MUD Gods, which was innovative in including online creation in its endgame. [2]

Laurie also has written several articles, papers [3] [4] [5] [6] and books, [7] [8] and is interested in ideal knots and their applications. [9] [10]

Laurie was a member of WikiLeaks' Advisory Board. [11] According to Laurie, he had little involvement with WikiLeaks, and didn't know who ran the site other than Julian Assange. [12] In 2009, he also said he wouldn't trust WikiLeaks to protect him if he were a whistleblower because "the things that Wikileaks relies on are not sufficiently strong to defend against" a government's resources. [13]

In 2024, Ben Laurie together with Al Cutter, Emilia Käsper and Adam Langley received the Levchin Prize “for creating and deploying Certificate Transparency at scale””. [14]

Related Research Articles

<span class="mw-page-title-main">Hacktivism</span> Computer-based activities as a means of protest

Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

Apache Lucene is a free and open-source search engine software library, originally written in Java by Doug Cutting. It is supported by the Apache Software Foundation and is released under the Apache Software License. Lucene is widely used as a standard foundation for production search applications.

In computer networking davfs2 is a Linux tool for connecting to WebDAV shares as though they were local disks. It is an open-source GPL-licensed file system for mounting WebDAV servers. It uses the FUSE file system API to communicate with the kernel and the neon WebDAV library for communicating with the web server.

Kleptography is the study of stealing information securely and subliminally. The term was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology – Crypto '96. Kleptography is a subfield of cryptovirology and is a natural extension of the theory of subliminal channels that was pioneered by Gus Simmons while at Sandia National Laboratory. A kleptographic backdoor is synonymously referred to as an asymmetric backdoor. Kleptography encompasses secure and covert communications through cryptosystems and cryptographic protocols. This is reminiscent of, but not the same as steganography that studies covert communications through graphics, video, digital audio data, and so forth.

SSLeay is an open-source SSL implementation. It was developed by Eric Andrew Young and Tim J. Hudson as an SSL 3.0 implementation using RC2 and RC4 encryption. The recommended pronunciation is to say each letter s-s-l-e-a-y and was first developed by Eric A. Young ("eay"). SSLeay also included an implementation of the DES from earlier work by Eric Young which was believed to be the first open-source implementation of DES. Development of SSLeay unofficially mostly ended, and volunteers forked the project under the OpenSSL banner around December 1998, when Hudson and Young both commenced working for RSA Security in Australia.

The Joint Worldwide Intelligence Communication System is the United States Department of Defense's secure intranet system that houses top secret and sensitive compartmented information. JWICS superseded the earlier DSNET2 and DSNET3, the Top Secret and SCI levels of the Defense Data Network based on ARPANET technology.

<span class="mw-page-title-main">Apache Taverna</span>

Apache Taverna was an open source software tool for designing and executing workflows, initially created by the myGrid project under the name Taverna Workbench, then a project under the Apache incubator. Taverna allowed users to integrate many different software components, including WSDL SOAP or REST Web services, such as those provided by the National Center for Biotechnology Information, the European Bioinformatics Institute, the DNA Databank of Japan (DDBJ), SoapLab, BioMOBY and EMBOSS. The set of available services was not finite and users could import new service descriptions into the Taverna Workbench.

A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder. The name was suggested in or before 2002 by Brian Zill at Microsoft Research. The term pseudospoofing had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".

<span class="mw-page-title-main">WikiLeaks</span> News leak publishing organisation

WikiLeaks is a media organisation and publisher of leaked documents. It is a non-profit and is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by Julian Assange, an Australian editor, publisher, and activist, who is currently challenging extradition to the United States over his work with WikiLeaks. Since September 2018, Kristinn Hrafnsson has served as its editor-in-chief. Its website states that it has released more than ten million documents and associated analyses. WikiLeaks' most recent publication of original documents was in 2019 and its most recent publication was in 2021. From November 2022, numerous documents on the organisation's website became inaccessible. In 2023, Assange said that WikiLeaks is no longer able to publish due to his imprisonment and the effect that US government surveillance and WikiLeaks' funding restrictions were having on potential whistleblowers.

<span class="mw-page-title-main">Decision stump</span> Boolean classifier from one decision

A decision stump is a machine learning model consisting of a one-level decision tree. That is, it is a decision tree with one internal node which is immediately connected to the terminal nodes. A decision stump makes a prediction based on the value of just a single input feature. Sometimes they are also called 1-rules.

<span class="mw-page-title-main">GroupLens Research</span> Computer science research lab

GroupLens Research is a human–computer interaction research lab in the Department of Computer Science and Engineering at the University of Minnesota, Twin Cities specializing in recommender systems and online communities. GroupLens also works with mobile and ubiquitous technologies, digital libraries, and local geographic information systems.

The Granai airstrike, sometimes called the Granai massacre, refers to the killing of approximately 86 to 147 Afghan civilians by an airstrike by a US Air Force B-1 Bomber on May 4, 2009, in the village of Granai in Farah Province, south of Herat, Afghanistan.

John Viega is an American computer security author, researcher and professional.

<span class="mw-page-title-main">Julian Assange</span> Australian editor, publisher, and activist, founder of WikiLeaks (born 1971)

Julian Paul Assange is an Australian editor, publisher and activist who founded WikiLeaks in 2006. He came to wide international attention in 2010 when WikiLeaks published a series of leaks from US Army intelligence analyst Chelsea Manning: footage of a US airstrike in Baghdad, US military logs from the Afghanistan and Iraq wars, and US diplomatic cables. Assange has won multiple awards for publishing and journalism.

<span class="mw-page-title-main">July 12, 2007, Baghdad airstrike</span> Series of air-to-ground attacks conducted in New Baghdad during the Iraqi insurgency

On July 12, 2007, a series of air-to-ground attacks were conducted by a team of two U.S. AH-64 Apache helicopters in Al-Amin al-Thaniyah, New Baghdad, during the Iraqi insurgency which followed the invasion of Iraq. On April 5, 2010, the attacks received worldwide coverage and controversy following the release of 39 minutes of classified gunsight footage by WikiLeaks. The video, which WikiLeaks titled Collateral Murder, showed the crew firing on a group of people and killing several of them, including two Reuters journalists, and then laughing at some of the casualties, all of whom were civilians. An anonymous U.S. military official confirmed the authenticity of the footage, which provoked global discussion on the legality and morality of the attacks.

The Transport Layer Security (TLS) protocol provides the ability to secure communications across or inside networks. This comparison of TLS implementations compares several of the most notable libraries. There are several TLS implementations which are free software and open source.

The United States diplomatic cables leak, widely known as Cablegate, began on Sunday, 28 November 2010 when WikiLeaks began releasing classified cables that had been sent to the U.S. State Department by 274 of its consulates, embassies, and diplomatic missions around the world. Dated between December 1966 and February 2010, the cables contain diplomatic analysis from world leaders, and the diplomats' assessment of host countries and their officials.

WikiLeaks began publishing emails leaked from strategic intelligence company Stratfor on 27 February 2012 under the title Global Intelligence Files. By July 2014, WikiLeaks had published 5,543,061 Stratfor emails. Wikileaks partnered with more than 25 world media organisations, including Rolling Stone, L’Espresso and The Hindu to analyse the documents.

Kenneth C. Millett is a professor of mathematics at the University of California, Santa Barbara. His research concerns low-dimensional topology, knot theory, and the applications of knot theory to DNA structure; his initial is the "M" in the name of the HOMFLY polynomial.

<span class="mw-page-title-main">Phineas Fisher</span> Hacktivist

Phineas Fisher is an unidentified hacktivist and self-proclaimed anarchist revolutionary. Notable hacks include the surveillance company Gamma International, Hacking Team, the Sindicat De Mossos d'Esquadra and the ruling Turkish Justice and Development Party three of which were later made searchable by WikiLeaks.

References

  1. "Ben Laurie". Archived from the original on 2005-10-25. Retrieved 2005-10-28. Ben Laurie page at Apache SSL
  2. Bartle, Richard (1990). "Interactive Multi-User Computer Games". Archived from the original on 2016-02-02.
  3. Laurie, B. (2004). "Network Forensics". Queue. 2 (4): 50–56. doi: 10.1145/1016978.1016982 .
  4. Danezis, G.; Laurie, B. (2004). "Minx". Proceedings of the 2004 ACM workshop on Privacy in the electronic society - WPES '04. p. 59. doi:10.1145/1029179.1029198. ISBN   1581139683. S2CID   2361282.
  5. Laurie, B.; Singer, A. (2008). "Choose the red pillandthe blue pill". Proceedings of the 2008 workshop on New security paradigms - NSPW '08. p. 127. doi:10.1145/1595676.1595695. ISBN   9781605583419. S2CID   15894451.
  6. Laurie, B. (2007). "Safer Scripting Through Precompilation". Security Protocols. Lecture Notes in Computer Science. Vol. 4631. pp. 284–288. doi:10.1007/978-3-540-77156-2_35. ISBN   978-3-540-77155-5.
  7. Laurie, Peter; Laurie, Ben (1997). Apache: The Definitive Guide (Nutshell Handbook) . Sebastopol, CA: O'Reilly. ISBN   1-56592-250-6.
  8. Laurie, Peter; Laurie, Ben (2002). Apache: the definitive guide. Sebastopol, CA: O'Reilly. ISBN   0-596-00203-3.
  9. Laurie, B.; Katritch, V.; Sogo, J.; Koller, T.; Dubochet, J.; Stasiak, A. (1998). "Geometry and Physics of Catenanes Applied to the Study of DNA Replication". Biophysical Journal. 74 (6): 2815–2822. Bibcode:1998BpJ....74.2815L. doi:10.1016/S0006-3495(98)77988-3. PMC   1299622 . PMID   9635735.
  10. Vologodskii, A.V.; Crisona, N.J.; Laurie, B.; Pieranski, P.; Katritch, V.; Dubochet, J.; Stasiak, A. (1998). "Sedimentation and electrophoretic migration of DNA knots and catenanes1". Journal of Molecular Biology. 278 (1): 1–3. doi: 10.1006/jmbi.1998.1696 . PMID   9571029.
  11. "WikiLeaks:Advisory Board - WikiLeaks". www.wikileaks.org. Retrieved 2022-07-26.
  12. Singel, Ryan. "Immune to Critics, Secret-Spilling Wikileaks Plans to Save Journalism ... and the World". Wired. ISSN   1059-1028 . Retrieved 2022-07-26.
  13. "Exposed: Wikileaks' secrets". Wired UK. ISSN   1357-0978 . Retrieved 2022-07-26.
  14. "The Levchin Prize for Real-World Cryptography". Real World Crypto Symposium. International Association for Cryptologic Research. Retrieved 9 April 2024.