Securology

(noun) securology. Latin: se cura logia
Literally translated: the study of being without care or worry

Wednesday, February 29, 2012

Traveling Light in a Time of Digital Thievery

›
This sounds exciting, like intrigue for spy fiction : When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travel...

DIY Drones

›
Do It Yourself Surveillance Drone Aircraft . Why? Because you still can. Adjust your one-liner: "if guns drones are outlawed, then...
Thursday, February 23, 2012

John Nash Crypto Letters

›
John Nash (inspiration for A Beautiful Mind ) wrote letters to the US Government in the 1950s which have recently been de classified and r...
Tuesday, February 7, 2012

Verisign Hacked!

›
Verisign was breached according to an SEC report (Reuters), yet they report almost no details and act like it's no big deal! An exce...
Wednesday, February 1, 2012

DNSCrypt

›
This is a very premature response to what I believe is the single best solution to dangers like SOPA, PIPA, and ACTA: DNSCrypt . To be fa...
2 comments:
Friday, December 23, 2011

DIY Lock Pick Set

›
Here's another very interesting post on lock-picking, like making a padlock shim out of soda can : How to make your own lock-picking to...
2 comments:
Tuesday, December 20, 2011

How to Shim Open a Padlock On the Cheap

›
This is a quick, cheap, and simple way to crack open a padlock with a homemade shim from a soda can . Not a new idea, but a well-described ...
Wednesday, March 23, 2011

RSA SecurID Breach - Seed Record Threats

›
The following is a threat model that assumes the RSA SecurID seed records have been stolen by a sophisticated adversary , which is probably ...
4 comments:
Tuesday, March 22, 2011

More RSA SecurID Reactions

›
RSA Released a new Customer FAQ regarding the RSA SecurID breach. Let's break it down ... Customer FAQ Incident Overview 1. What h...
1 comment:
Friday, March 18, 2011

RSA SecurID Breach - Initial Reactions

›
RSA, the security division of EMC, was breached by a sophisticated adversary who stole something of value pertaining to RSA SecurID two fac...
1 comment:
Friday, February 18, 2011

Seven Types of Hackers

›
This could also be titled "Taxonomies are Difficult". ... Roger Grimes at InfoWorld has a Seven Types of Hackers article. Ta...
Sunday, January 30, 2011

Visualize Irony

›
What's the point of the heavy-duty chain and lock if one of the chain's links is just a zip-tie?
Thursday, July 1, 2010

Schneier vs PCI

›
Bruce Schneier just echoed what I wrote back in December 2008 that the encryption key management aspects of PCI 1.2 and earlier are flat-ou...
Friday, May 21, 2010

Verisign Turns Yellow

›
On the heels of turning PGP corp Yellow , now Verisign is turning Yellow, too . Symantec is acquiring Verisign, too. These overpriced ...
Monday, March 29, 2010

SSL & Big Government. Where's Phil Zimmerman?

›
What an interesting year 2010 is already turning out to be in technology, politics, and life as we know it. More censorship battles are goi...
2 comments:
Thursday, February 25, 2010

Earth Shattering Attacks on Disk Encryption

›
Trusted Platform Modules (TPMs) are were the last hope of truly secure distributed computing endpoints. The idea behind TPMs is that they...
4 comments:
Wednesday, December 2, 2009

The Reality of Evil Maids

›
There have been many attacks on whole disk encryption recently: Cold Boot attacks in which keys hang around in memory a lot longer than m...
1 comment:
‹
›
Home
View web version
Powered by Blogger.