A Feminist Take on Information Privacy
Maria Farrell has a really interesting framing of information/device privacy: What our smartphones and relationship abusers share is that they both exert power over us in a world shaped to tip the...
View ArticleCrown Sterling Claims to Factor RSA Keylengths First Factored Twenty Years Ago
Earlier this month, I made fun of a company called Crown Sterling, for…for…for being a company that deserves being made fun of. This morning, the company announced that they “decrypted two 256-bit...
View ArticleFriday Squid Blogging: Piglet Squid
Another piglet squid video. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
View ArticleFrance Outlines Its Approach to Cyberwar
In a document published earlier this month (in French), France described the legal framework in which it will conduct cyberwar operations. Lukasz Olejnik explains what it means, and it’s worth reading.
View ArticleRussians Hack FBI Comms System
Yahoo News reported that the Russians have successfully targeted an FBI communications system: American officials discovered that the Russians had dramatically improved their ability to decrypt certain...
View ArticleIneffective Package Tracking Facilitates Fraud
This article discusses an e-commerce fraud technique in the UK. Because the Royal Mail only tracks packages to the postcode—and not to the address – it’s possible to commit a variety of different...
View ArticleOn Chinese "Spy Trains"
The trade war with China has reached a new industry: subway cars. Congress is considering legislation that would prevent the world’s largest train maker, the Chinese-owned CRRC Corporation, from...
View ArticleSuperhero Movies and Security Lessons
A paper I co-wrote was just published in Security Journal: “Superheroes on screen: real life lessons for security debates“: Abstract: Superhero films and episodic shows have existed since the early...
View ArticleFriday Squid Blogging: Did Super-Intelligent Giant Squid Steal an Underwater...
There’s no proof they did, but there’s no proof they didn’t. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...
View ArticleSupply-Chain Security and Trust
The United States government’s continuing disagreement with the Chinese company Huawei underscores a much larger problem with computer technologies in general: We have no choice but to trust them...
View Article