Securology

(noun) securology. Latin: se cura logia
Literally translated: the study of being without care or worry

Friday, October 5, 2007

About "Backdoors" ...

›
Again, inspired by the PGP WDE Bypass Issue ... I am not the only one in the world that uses the term " backdoor " in a generic...

PGP's Publicized Documentation of WDE Bypass

›
John Dasher, Director of Product Management at PGP, commented with a link to PGP's documentation on the WDE Bypass Feature . I though...

More on the PGP issue

›
There have been several comments regarding the PGP whole disk encryption bypass issue and in the process a few people have brought up the q...
Thursday, October 4, 2007

Response to Jon Callas - continued #2

›
This is the continuation of my response to Jon Callas regarding the PGP Whole Disk Encryption bypass . I can appreciate the problems inhe...
6 comments:

PGP Bypass on Slashdot

›
Thanks, Slashdot . Some of your comments are on target, some ... well, I anticipated the knee-jerk response you gave. Many people (even te...
7 comments:

Are Security Model's Bankrupt: Microsoft's Stride Chart

›
Over on the Microsoft SDL ( Security Development Lifecycle ) blog, there's a post about a security tool Microsoft uses in their threat ...
1 comment:
Wednesday, October 3, 2007

Response to Jon Callas - PGP Encryption Bypass

›
As I can only assume the real Jon Callas placed this comment (and, Jon, I am grateful for your time and thoughts if it is you), here are m...
16 comments:
Monday, October 1, 2007

PGP Whole Disk Encryption - Barely Acknowledged Intentional Bypass

›
Popular whole disk encryption vendor, PGP Corporation , has a remote support “feature” which allows unattended reboots, fully-bypassing the ...
32 comments:
Friday, September 28, 2007

Thomas Ptacek on DMA, Virtualization, and Nate Lawson

›
Thomas Ptacek makes an important comparison between network security and memory/hardware resource allocation, especially in terms of virtu...

Code Review vs. Application Layer Firewall

›
In a recent sales attempt, I received a whitepaper (warning: PDF) from Web Application Layer Firewall vendor Imperva entitled: "The N...
6 comments:

Nate Lawson on DMA/IOMMU

›
In the past few days, Nate Lawson has a couple interesting articles on PC Memory Architecture and Protecting Memory from DMA using IOMMU ...
Sunday, September 23, 2007

More comments on the PDF vulnerability

›
Matasano has some comments on the recent PDF vulnerability : "Modern PDF Readers do crazy things. Like embed remote web pages. T...
Friday, September 21, 2007

Still more separation of code and data

›
Separating code from data is a HUGE problem (possibly a root of all remote code execution evil) . Here's more info, some of it new, s...
Thursday, September 20, 2007

Symantec Considers White Lists

›
After years of attempting to convince every Symantec SE I met to drop the Sisyphean virus signature database model, it appears that Symantec...
Wednesday, September 19, 2007

Trust at the foundational levels: IOMMU & DMA

›
IOMMU , or Input Output Memory Management Unit, will likely play a large role in the security of future operating systems. If IOMMU does no...
Wednesday, September 12, 2007

Se Cura: Free of Care or Worry

›
" Secure " derives from the Latin words se , meaning "without", and cura , meaning "care" or "worry...

The Woes of TOR

›
I predicted this a year or so ago (when I first heard of TOR ), but as predictions go, they don't have value if they aren't publishe...
Wednesday, September 5, 2007

Separation of Code and Data

›
One of the most surprising things for a savvy information security practitioner is the continued prevalence of intermingling of code and dat...
Saturday, September 1, 1984

About this blog...

›
As it says above (and below for posterity), the intention of this blog is to look at the scientific aspects of security, namely "inform...
‹
Home
View web version
Powered by Blogger.