Serious Security: How to make sure you don’t miss bug reports!
September 13 2021Hey, let's create a text file that lists our security contacts! We'll call it... security DOT txt.
Read moreHey, let's create a text file that lists our security contacts! We'll call it... security DOT txt.
Read moreSusan Landau wrote an essay on the privacy, efficacy, and equity of contract-tracing smartphone apps. Also see her excellent book on the topic.
Read moreAfter being compelled by a Swiss court to monitor IP logs for a particular user, ProtonMail no longer claims that “we do not keep any IP logs.”
EDITED...
Read moreLatest episode - listen now!
Read more
Vice has an article about how data brokers sell access to the Internet backbone. This is netflow data. It’s useful for cybersecurity forensics, but can also be used...
Read moreThat's funny. I could have sworn I didn't run a print job yesterday... but will you look at that?
Read more
In this post, I’ll collect links on Apple’s iPhone backdoor for scanning CSAM images. Previous links are here and here.
Apple says that hash collisions in its...
Read moreLastest episode - listen, laugh and learn! This week, Chester Wisniewski joins us on the show.
Read moreForewarned is forearmed. Here's our advice on dealing with "copyright infringement" scammers.
Read more
Apple’s announcement that it’s going to start scanning photos for child abuse material is a big deal. (Here are five news stories.) I...
Read more
Recent Comments