Our people weigh in on the issues of the day.
Blue Slate's people think a lot about the challenges facing their industries today. In the process, they often come up with completely unexpected slants on current issues, or new ways of thinking about business problems. Bluespeak is where they share those thoughts. Feel free to read and reflect.
[Any views or opinion represented in this blog are personal and belong solely to the blogger and do not represent those of Blue Slate Solutions.]
The Internet is full of examples of simplifications creating vulnerabilities. A good number of these can be represented as indirection enablers. IP addresses, domain names, URIs, tiny URLs, QR Codes and now Microsoft tags. Each of these serves the purpose of simplifying and decoupling. We have seen many exploits for the first four, what about these last two?
As you likely know, QR Codes and Microsoft tags are graphical images targeted at print media, though there is no reason they can’t be used in an online fashion. They are most often presented as rectangular graphics (examples below). The reason for using them is to provide an easy way for someone to access a web page (or other online resource) related to the printed content. Since these images represent character data they can also be used to house information, like contact details, that do not require online access to interpret.[Read More]