ENCSecurity markets a file encryption system, and it’s used by SanDisk, Sony, Lexar, and probably others. Despite it using AES as its algorithm, its implementation is flawed in multiple...
Read moreNeat video. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
Read moreTwitter was fined $150 million for using phone numbers and email addresses collected for two-factor authentication for ad targeting.
Read moreSmartphones and Civilians in Wartime
June 9 2022Interesting article about civilians using smartphones to assist their militaries in wartime, and how that blurs the important legal distinction between combatants and non-combatants:
The principle of distinction...
Read more
People are leaking classified military information on discussion boards for the video game War Thunder to win arguments—repeatedly.
Read moreLong Story on the Accused CIA Vault 7 Leaker
June 6 2022Long article about Joshua Schulte, the accused leaker of the WikiLeaks Vault 7 and Vault 8 CIA data. Well worth reading.
Read moreOctopus and squid genes are weird. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...
Read moreMe on Public-Interest Tech
June 3 2022Back in November 2020, in the middle of the COVID-19 pandemic, I gave a virtual talk at the International Symposium on Technology and Society: “The Story of the Internet...
Read moreRemotely Controlling Touchscreens
June 2 2022Researchers have demonstrated controlling touchscreens at a distance, at least in a laboratory setting:
The core idea is to take advantage of the electromagnetic signals to execute basic touch...
Read more
Recent Comments