Revision tracking/visualization:

Hmm, haven’t bothered to do any searching with it, but obviously Google Personalized’s approach of manually creating a category profile is only a stepping stone to say, building a profile from your past searches or via *eh-hrrrm* scanning other personal information exchanges.

Interesting tidbits. They require DOM/JS support for creating a profile, an yes, it is Kaltix based:

kid koala == ‘teh roxors’

Ninja Tune is doing this sort of globehopping tour thing called Zen TV. If they pass by, I definitely recommend it (the show started way early and I was running behind so I missed Blockhead and Diplo, but caught Bonobo, Kid Koala, and Amon Tobin). Great sets by all, but Kid Koala was definitely the stand-out. If you get a chance to see him, definitely go. And yes, it is more fun if you’re dancing.

I’ve forgotten how much I’ve come to depend on CRM114. Out of the last 100 messages, 67 were spam. (While I’m not getmailing, I’m using Apple Mail’s Bayesian, which works pretty well [I’ve train it along w/ CRM114])

SSH Tunnel manager is a great GUI for SSH tunneling for OS X. If there was a way to disable ports when not tunnelled, that would be stupendously useful (I’m thinking about in conference situations, when you have say an overly aggressive chat client)…

For Windows, I tried pTunnel, but for some reason it didn’t work. Putty works, of course, although it’d be nice to not have to have a running shell in the taskbar/screen.

— Bothered enough by the last thought that I talked w/ a few people about it. I initially started by thinking about laptop wakeup scripts, but that doesn’t solve collapsing tunnels and still doesn’t insure stuff going out encrypted. Cal suggested a firewall level solution, which I think is on the right track. A 90% solution (and one that’ll definitely solve the chat client problem) is to drop outgoing packets on the tunnel ports for everything but the SSH tunneling server. The other 10%, cleartext communication to the tunneling server shouldn’t happen if you can use secure communications (HTTPS, IMAP-SSL, SMTP-AUTH). The 100% solution is to write firewall rules to pass all data through a local proxy/daemon that will do packet analysis to make sure that there’s no plaintext (basically running everything through ethereal/ettercap. Sure you’ll take a performance hit, but for conferences/other insecure locations, it’s much better than the alternative) — actually, it’d probably be possible/easier to simply be a tunnel manager that will make sure that tunnels are up…