Location-Based Security — The researchers have created a customized version of Android controlled by a “policy engine” on a server. The Android devices use Bluetooth and near-field communications infrastructure to determine the location of the user, and what level of access they have to what kind of information, as well as the level of functionality of their device. Security, however, is defined not by what you can do but by what the bad guys can’t do, and this seems very dependent upon external triggers (wifi and bluetooth) which are readily faked.
Google Puts a Price on Privacy — I’d never realized before that https and referer information are only loosely compatible: Google has to go to efforts to restore referer information because browsers don’t pass the referer tag on when going from https (e.g., google.com) to http (e.g., your web site).
The growing role of software architects: “Architecture has become much more interesting now because it’s become more encompassing," says Neal Ford, software architect and meme wrangler at ThoughtWorks.