Twitter was fined $150 million for using phone numbers and email addresses collected for two-factor authentication for ad targeting.
Read moreSmartphones and Civilians in Wartime
June 9 2022Interesting article about civilians using smartphones to assist their militaries in wartime, and how that blurs the important legal distinction between combatants and non-combatants:
The principle of distinction...
Read more
People are leaking classified military information on discussion boards for the video game War Thunder to win arguments—repeatedly.
Read moreLong Story on the Accused CIA Vault 7 Leaker
June 6 2022Long article about Joshua Schulte, the accused leaker of the WikiLeaks Vault 7 and Vault 8 CIA data. Well worth reading.
Read moreOctopus and squid genes are weird. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...
Read moreMe on Public-Interest Tech
June 3 2022Back in November 2020, in the middle of the COVID-19 pandemic, I gave a virtual talk at the International Symposium on Technology and Society: “The Story of the Internet...
Read moreRemotely Controlling Touchscreens
June 2 2022Researchers have demonstrated controlling touchscreens at a distance, at least in a laboratory setting:
The core idea is to take advantage of the electromagnetic signals to execute basic touch...
Read more
Clever — and Exploitable — Windows Zero-Day
June 1 2022Researchers have reported a still-unpatched Windows zero-day that is currently being exploited in the wild. Here’s the advisory, which includes a work-around until a patch is available.
Read moreThe Limits of Cyber Operations in Wartime
May 31 2022Interesting paper by Lennart Maschmeyer: “The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations“:
Abstract: Although cyber conflict has existed for thirty years, the strategic utility of cyber...
Read more
Recent Comments