{"id":67,"date":"2008-01-02T15:15:41","date_gmt":"2008-01-02T19:15:41","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2008\/01\/02\/how-to-surf-from-hostile-networks\/"},"modified":"2008-01-02T15:15:41","modified_gmt":"2008-01-02T19:15:41","slug":"how-to-surf-from-hostile-networks","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2008\/01\/02\/how-to-surf-from-hostile-networks\/","title":{"rendered":"How to surf from hostile networks"},"content":{"rendered":"<p>NYT article claiming to help with the issue of kiosk network connections.  They could have keyboard sniffers, network sniffers, or just good old spyware.  <\/p>\n<p><a href=\"http:\/\/www.nytimes.com\/2006\/05\/25\/technology\/25lexar.html?ei=5088&amp;en=c230fdfd1ba46cd7&amp;ex=1306209600&amp;adxnnl=1&amp;partner=rssnyt&amp;emc=rss&amp;adxnnlx=1148718678-qIwH8o7wk+oEqVWUv+KsAQ&amp;pagewanted=print\">Print edition<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NYT article claiming to help with the issue of kiosk network connections. They could have keyboard sniffers, network sniffers, or just good old spyware. Print edition<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[272],"tags":[],"class_list":["post-67","post","type-post","status-publish","format-standard","hentry","category-digital-warfare"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=67"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/67\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=67"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=67"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}