|
schneier_sec
|
Dec 08, 2016 |
U.S. Elections Are a Mess, Even Though There’s No Evidence This One Was Hacked
|
|
schneier_sec
|
Dec 08, 2016 |
New NSA Stories
|
|
schneier_sec
|
Apr 23, 2016 |
The Value of Encryption
|
|
schneier_sec
|
Apr 23, 2016 |
Friday Squid Blogging: My Little Cephalopod
|
|
schneier_sec
|
Apr 07, 2016 |
Bypassing Phone Security through Social Engineering
|
|
schneier_sec
|
Apr 06, 2016 |
IBM Officially Owns Resilient Systems
|
|
schneier_sec
|
Apr 06, 2016 |
CONIKS
|
|
schneier_sec
|
Apr 05, 2016 |
WhatsApp is Now End-to-End Encrypted
|
|
schneier_sec
|
Apr 04, 2016 |
Smart Essay on the Limitations of Anti-Terrorism Security
|
|
schneier_sec
|
Apr 01, 2016 |
Friday Squid Blogging: Composite Materials Based on Squid Beaks
|
|
schneier_sec
|
Apr 01, 2016 |
Reddit's Warrant Canary Just Died
|
|
schneier_sec
|
Apr 01, 2016 |
Hacking Elections in Latin America
|
|
schneier_sec
|
Mar 31, 2016 |
ISIS Encryption Opsec
|
|
schneier_sec
|
Mar 30, 2016 |
http://ur1.ca/optq6 Why You Should Side With Apple, Not the FBI, in the San Bernardino iPhone Case
|
|
schneier_sec
|
Mar 30, 2016 |
http://ur1.ca/optq1 Friday Squid Blogging: President Squid
|
|
schneier_sec
|
Feb 03, 2016 |
http://ur1.ca/oh844 Security vs. Surveillance
|
|
schneier_sec
|
Feb 03, 2016 |
http://ur1.ca/oh545 Security vs. Surveillance
|
|
schneier_sec
|
Feb 02, 2016 |
http://ur1.ca/oh2m7 The Internet Of Things Will Be The World's Biggest Robot
|
|
schneier_sec
|
Feb 02, 2016 |
http://ur1.ca/oh24i Paper on the Going Dark Debate
|
|
schneier_sec
|
Feb 02, 2016 |
http://ur1.ca/oh11d More Details on the NSA Switching to Quantum-Resistant Cryptography
|
|
schneier_sec
|
Feb 01, 2016 |
http://ur1.ca/ogxh5 NSA and GCHQ Hacked Israeli Drone Feeds
|
|
schneier_sec
|
Feb 01, 2016 |
http://ur1.ca/ogvxm NSA's TAO Head on Internet Offense and Defense
|
|
schneier_sec
|
Jan 29, 2016 |
http://ur1.ca/oglar Friday Squid Blogging: Polynesian Squid Hook
|
|
schneier_sec
|
Jan 29, 2016 |
http://ur1.ca/ogkvi Encryption Backdoor Comic
|
|
schneier_sec
|
Jan 29, 2016 |
http://ur1.ca/ogjce Integrity and Availability Threats
|
|
schneier_sec
|
Jan 28, 2016 |
http://ur1.ca/oggip Psychological Model of Selfishness
|
|
schneier_sec
|
Jan 27, 2016 |
http://ur1.ca/ogfro When Hacking Could Enable Murder
|
|
schneier_sec
|
Jan 27, 2016 |
http://ur1.ca/ogfrp How an Overreaction to Terrorism Can Hurt Cybersecurity
|
|
schneier_sec
|
Jan 27, 2016 |
http://ur1.ca/ogdq9 Horrible Story of Digital Harassment
|
|
schneier_sec
|
Jan 26, 2016 |
http://ur1.ca/ogb9w Data Driven Policing
|
|
schneier_sec
|
Jan 25, 2016 |
http://ur1.ca/og7qv Shodan Lets Your Browse Insecure Webcams
|
|
schneier_sec
|
Jan 22, 2016 |
http://ur1.ca/ofx4x Friday Squid Blogging: North Coast Squid
|
|
schneier_sec
|
Jan 22, 2016 |
http://ur1.ca/ofwoz UK Government Promoting Backdoor-Enabled Voice Encryption Protocol
|
|
schneier_sec
|
Jan 22, 2016 |
http://ur1.ca/ofux6 Security Trade-offs in the Longbow vs. Crossbow Decision
|
|
schneier_sec
|
Jan 21, 2016 |
http://ur1.ca/ofp8f El Chapo's Opsec
|
|
schneier_sec
|
Jan 20, 2016 |
http://ur1.ca/ofkm4 France Rejects Back Doors in Encryption Products
|
|
schneier_sec
|
Jan 19, 2016 |
http://ur1.ca/ofi9z Reverse-Engineering a Zero-Day Exploit from the Hacking Team Data Dump
|
|
schneier_sec
|
Jan 18, 2016 |
http://ur1.ca/ofe2s Counterfeit Theater Tickets in New York
|
|
schneier_sec
|
Jan 18, 2016 |
http://ur1.ca/ofdfv Match Fixing in Tennis
|
|
schneier_sec
|
Jan 16, 2016 |
http://ur1.ca/of5sx Should We Allow Bulk Searching of Cloud Archives?
|
|
schneier_sec
|
Jan 15, 2016 |
http://ur1.ca/of1tq Spamming Someone from PayPal
|
|
schneier_sec
|
Jan 14, 2016 |
http://ur1.ca/oeywi Fighting DRM in the W3C
|
|
schneier_sec
|
Jan 14, 2016 |
http://ur1.ca/oex3q Sean Penn's Opsec
|
|
schneier_sec
|
Jan 13, 2016 |
http://ur1.ca/oerpm The Internet of Things that Talks About You Behind Your Back
|
|
schneier_sec
|
Jan 12, 2016 |
http://ur1.ca/oeoh4 Michael Hayden and the Dutch Government Are against Crypto Backdoors
|
|
schneier_sec
|
Jan 11, 2016 |
http://ur1.ca/oekeb Mac OS X, iOS, and Flash Had the Most Discovered Vulnerabilities in 2015
|
|
schneier_sec
|
Jan 11, 2016 |
http://ur1.ca/oeien IT Security and the Normalization of Deviance
|
|
schneier_sec
|
Jan 09, 2016 |
http://ur1.ca/oebrv The Internet of Things That Talk About You Behind Your Back
|
|
schneier_sec
|
Jan 08, 2016 |
http://ur1.ca/oe8cd Friday Squid Blogging: Squid Ink Pasta
|
|
schneier_sec
|
Jan 08, 2016 |
http://ur1.ca/oe7zy Podcast Interview with Me
|
|
schneier_sec
|
Jan 08, 2016 |
http://ur1.ca/oe7pe "How Stories Deceive"
|
|
schneier_sec
|
Jan 08, 2016 |
http://ur1.ca/oe6bc Replacing Judgment with Algorithms
|
|
schneier_sec
|
Jan 07, 2016 |
http://ur1.ca/oe1p8 Straight Talk about Terrorism
|
|
schneier_sec
|
Jan 06, 2016 |
http://ur1.ca/oe09b The Risks—and Benefits—of Letting Algorithms Judge Us
|
|
schneier_sec
|
Jan 06, 2016 |
http://ur1.ca/odx7n How the US Is Playing Both Ends on Data Privacy
|
|
schneier_sec
|
Jan 05, 2016 |
http://ur1.ca/oduab 1981 CIA Report on Deception
|
|
schneier_sec
|
Jan 05, 2016 |
http://ur1.ca/odt06 NSA Spies on Israeli Prime Minister
|
|
schneier_sec
|
Jan 04, 2016 |
http://ur1.ca/odq95 Windows 10 Whole-Disk Encryption without Key Escrow
|
|
schneier_sec
|
Jan 04, 2016 |
http://ur1.ca/odoyi De-Anonymizing Users from their Coding Styles
|
|
schneier_sec
|
Jan 01, 2016 |
http://ur1.ca/odelg Friday Squid Blogging: Video of Live Giant Squid
|
|
schneier_sec
|
Dec 31, 2015 |
http://ur1.ca/oda6p Cory Doctorow on Software Security and the Internet of Things
|
|
schneier_sec
|
Dec 30, 2015 |
http://ur1.ca/od611 Another Scandal Resulting from E-mails Gone Public
|
|
schneier_sec
|
Dec 29, 2015 |
http://ur1.ca/od4gt PayPal Authentication Still Substandard
|
|
schneier_sec
|
Dec 29, 2015 |
http://ur1.ca/od3y9 DMCA and the Internet of Things
|
|
schneier_sec
|
Dec 28, 2015 |
http://ur1.ca/od240 NSA/GCHQ Exploits Against Juniper Networking Equipment
|
|
schneier_sec
|
Dec 26, 2015 |
http://ur1.ca/od093 How the Internet of Things Limits Consumer Choice
|
|
schneier_sec
|
Dec 25, 2015 |
http://ur1.ca/ocyvs Friday Squid Blogging: Squid Christmas
|
|
schneier_sec
|
Dec 24, 2015 |
http://ur1.ca/ocxef Burglary Footage Turned into Commercial
|
|
schneier_sec
|
Dec 24, 2015 |
http://ur1.ca/ocx0l Police Dog Sniffs for Hard Drives
|
|
schneier_sec
|
Dec 23, 2015 |
http://ur1.ca/ocv21 Using Law Against Technology
|
|
schneier_sec
|
Dec 22, 2015 |
http://ur1.ca/octed More Writings on the Second Crypto Wars
|
|
schneier_sec
|
Dec 21, 2015 |
http://ur1.ca/ocsxk Can Laws Keep Up with Tech World?
|
|
schneier_sec
|
Dec 21, 2015 |
http://ur1.ca/ocsit "The Medieval Origins of Mass Surveillance"
|
|
schneier_sec
|
Dec 21, 2015 |
http://ur1.ca/ocs2d Back Door in Juniper Firewalls
|
|
schneier_sec
|
Dec 18, 2015 |
http://ur1.ca/oco1g Friday Squid Blogging: Penguins Fight over Squid
|
|
schneier_sec
|
Dec 18, 2015 |
http://ur1.ca/ocnow GCHQ Holiday Puzzle
|
|
schneier_sec
|
Dec 18, 2015 |
http://ur1.ca/ocn76 25th Anniversary of the Landmark Unix Security Book
|
|
schneier_sec
|
Dec 17, 2015 |
http://ur1.ca/ocli4 Catalog of Police Surveillance Equipment
|
|
schneier_sec
|
Dec 17, 2015 |
http://ur1.ca/ockzx User Errors Often Compromise Encryption
|
|
schneier_sec
|
Dec 16, 2015 |
http://ur1.ca/ociod DOS Attack Against Los Angeles Schools
|
|
schneier_sec
|
Dec 14, 2015 |
http://ur1.ca/ocfug Attack Against DNS Root Servers
|
|
schneier_sec
|
Dec 14, 2015 |
http://ur1.ca/ocetq "Security Theater" Sighting
|
|
schneier_sec
|
Dec 14, 2015 |
http://ur1.ca/oce3q Good Swatting Story
|
|
schneier_sec
|
Dec 11, 2015 |
http://ur1.ca/oc939 Friday Squid Blogging: Rare Octopus Squid Video from Hawaii
|
|
schneier_sec
|
Dec 11, 2015 |
http://ur1.ca/oc8zd Resilient Systems News: End-of-Year Trends Webinar
|
|
schneier_sec
|
Dec 11, 2015 |
http://ur1.ca/oc883 Hit-and-Run Driver Arrested Because Car Reported Accident
|
|
schneier_sec
|
Dec 10, 2015 |
http://ur1.ca/oc5p7 How People Learn about Computer Security
|
|
schneier_sec
|
Dec 09, 2015 |
http://ur1.ca/oc3t3 Terrifying Technologies
|
|
schneier_sec
|
Dec 09, 2015 |
http://ur1.ca/oc34u Worldwide Cryptographic Products Survey: Edits and Additions Wanted
|
|
schneier_sec
|
Dec 09, 2015 |
http://ur1.ca/oc33z How Israel Regulates Encryption
|
|
schneier_sec
|
Dec 09, 2015 |
http://ur1.ca/oc346 The Moral Dimension of Cryptography
|
|
schneier_sec
|
Dec 09, 2015 |
http://ur1.ca/oc342 BlackBerry Leaves Pakistan Rather Than Provide a Government Backdoor
|
|
schneier_sec
|
Dec 09, 2015 |
http://ur1.ca/oc340 Forced Authorization Attacks Against Chip-and-Pin Credit Card Terminals
|
|
schneier_sec
|
Dec 01, 2015 |
http://ur1.ca/oc06l Tracking Someone Using LifeLock
|
|
schneier_sec
|
Nov 30, 2015 |
http://ur1.ca/obxiw A History of Privacy
|
|
schneier_sec
|
Nov 30, 2015 |
http://ur1.ca/obwm7 Cryptanalysis of Algebraic Eraser
|
|
schneier_sec
|
Nov 27, 2015 |
http://ur1.ca/obqq5 Friday Squid Blogging: Squid Necklace
|
|
schneier_sec
|
Nov 27, 2015 |
http://ur1.ca/obqj0 Data and Goliath in German
|
|
schneier_sec
|
Nov 27, 2015 |
http://ur1.ca/obpw4 Defending against Actual IT Threats
|
|
schneier_sec
|
Nov 25, 2015 |
http://ur1.ca/obljr NSA Lectures on Communications Security from 1973
|
|
schneier_sec
|
Nov 24, 2015 |
http://ur1.ca/objq6 NSA Collected Americans' E-mails Even After it Stopped Collecting Americans' E-mails
|
|
schneier_sec
|
Nov 24, 2015 |
http://ur1.ca/obiax Policy Repercussions of the Paris Terrorist Attacks
|
|
schneier_sec
|
Nov 23, 2015 |
http://ur1.ca/obb4g Voter Surveillance
|
|
schneier_sec
|
Nov 20, 2015 |
http://ur1.ca/oaqvk Friday Squid Blogging: Squid Spawning in South Australian Waters
|
|
schneier_sec
|
Nov 20, 2015 |
http://ur1.ca/oaoab Reputation in the Information Age
|
|
schneier_sec
|
Nov 19, 2015 |
http://ur1.ca/oahq4 RFID-Shielded, Ultra-Strong Duffel Bags
|
|
schneier_sec
|
Nov 18, 2015 |
http://ur1.ca/oaccb Paris Terrorists Use Double ROT-13 Encryption
|
|
schneier_sec
|
Nov 18, 2015 |
http://ur1.ca/oaa5d Ads Surreptitiously Using Sound to Communicate Across Devices
|
|
schneier_sec
|
Nov 17, 2015 |
http://ur1.ca/oa6ew The Automation of Reputation
|
|
schneier_sec
|
Nov 17, 2015 |
http://ur1.ca/oa4gg On CISA
|
|
schneier_sec
|
Nov 17, 2015 |
http://ur1.ca/oa3ec Refuse to Be Terrorized
|
|
schneier_sec
|
Nov 16, 2015 |
http://ur1.ca/oa07h Paris Attacks Blamed on Strong Cryptography and Edward Snowden
|
|
schneier_sec
|
Nov 16, 2015 |
http://ur1.ca/o9ya1 Did Carnegie Mellon Attack Tor for the FBI?
|
|
schneier_sec
|
Nov 13, 2015 |
http://ur1.ca/o9o4k Friday Squid Blogging: Squid Fishing Championship
|
|
schneier_sec
|
Nov 13, 2015 |
http://ur1.ca/o9nmx Amazon Chooses Data and Goliath as a Best Book of 2015
|
|
schneier_sec
|
Nov 13, 2015 |
http://ur1.ca/o9ly4 Personal Data Sharing by Mobile Apps
|
|
schneier_sec
|
Nov 12, 2015 |
http://ur1.ca/o9iw7 Testing the Usability of PGP Encryption Tools
|
|
schneier_sec
|
Nov 12, 2015 |
http://ur1.ca/o9ha1 Betting Ticket Forged Based on Selfie
|
|
schneier_sec
|
Nov 11, 2015 |
http://ur1.ca/o9eh4 Bypassing the iPhone Activation Lock
|
|
schneier_sec
|
Nov 11, 2015 |
http://ur1.ca/o9dhp Ransomware Is Getting Sophisticated
|
|
schneier_sec
|
Nov 10, 2015 |
http://ur1.ca/o9atq IT Security Is Still a Great Career Path
|
|
schneier_sec
|
Nov 10, 2015 |
http://ur1.ca/o9918 Linus Torvalds on Linux Security
|
|
schneier_sec
|
Nov 09, 2015 |
http://ur1.ca/o947r Good Article on the Blockchain
|
|
schneier_sec
|
Nov 06, 2015 |
http://ur1.ca/o8t9w Friday Squid Blogging: The Symbiotic Relationship Between Squid and Bacteria
|
|
schneier_sec
|
Nov 05, 2015 |
http://ur1.ca/o8nf5 Passwords by Mail
|
|
schneier_sec
|
Nov 05, 2015 |
http://ur1.ca/o8lba The Effects of Surveillance on the Victims
|
|
schneier_sec
|
Nov 04, 2015 |
http://ur1.ca/o8h9w Analyzing Reshipping Mule Scams
|
|
schneier_sec
|
Nov 03, 2015 |
http://ur1.ca/o8c1a $1M Bounty for iPhone Hack
|
|
schneier_sec
|
Nov 03, 2015 |
http://ur1.ca/o89vs Australia Is Testing Virtual Passports
|
|
schneier_sec
|
Nov 02, 2015 |
http://ur1.ca/o84t1 The Rise of Political Doxing
|
|
schneier_sec
|
Oct 30, 2015 |
http://ur1.ca/o7w8t Friday Squid Blogging: Baby Giant Squid Found
|
|
schneier_sec
|
Oct 30, 2015 |
http://ur1.ca/o7vye The Onion on the State of IT Security
|
|
schneier_sec
|
Oct 30, 2015 |
http://ur1.ca/o7u83 Weaknesses in the PLAID Protocol
|
|
schneier_sec
|
Oct 29, 2015 |
http://ur1.ca/o7qg2 Flash Drive Lock
|
|
schneier_sec
|
Oct 29, 2015 |
http://ur1.ca/o7ovh Tracking Connected Vehicles
|
|
schneier_sec
|
Oct 28, 2015 |
http://ur1.ca/o7lcb The Rise of Political Doxing
|
|
schneier_sec
|
Oct 28, 2015 |
http://ur1.ca/o7l2b Why Is the NSA Moving Away from Elliptic Curve Cryptography?
|
|
schneier_sec
|
Oct 28, 2015 |
http://ur1.ca/o7j7y The Doxing Trend
|
|
schneier_sec
|
Oct 27, 2015 |
http://ur1.ca/o7dth The Need for Transparency in Surveillance
|
|
schneier_sec
|
Oct 26, 2015 |
http://ur1.ca/o75i7 Ravens Can Identify Cheaters
|
|
schneier_sec
|
Oct 26, 2015 |
http://ur1.ca/o7240 Microsoft's Brad Smith on the Collapse of Safe Harbor
|
|
schneier_sec
|
Oct 24, 2015 |
http://ur1.ca/o6fen Face Facts about Internet Security
|
|
schneier_sec
|
Oct 23, 2015 |
http://ur1.ca/o61cv Friday Squid Blogging: Squid Bed Sheets
|
|
schneier_sec
|
Oct 23, 2015 |
http://ur1.ca/o5tuw Forensic Analysis of Smart Card Fraud
|
|
schneier_sec
|
Oct 22, 2015 |
http://ur1.ca/o5ert Hacking Fitbit
|
|
schneier_sec
|
Oct 22, 2015 |
http://ur1.ca/o5a08 Police Want Genetic Data from Corporate Repositories
|
|
schneier_sec
|
Oct 21, 2015 |
http://ur1.ca/o4vkv Forgotten Passwords
|
|
schneier_sec
|
Oct 21, 2015 |
http://ur1.ca/o4r3k Security Risks of Unpatched Android Software
|
|
schneier_sec
|
Oct 19, 2015 |
http://ur1.ca/o387n How to Commandeer a Store PA System
|
|
schneier_sec
|
Oct 16, 2015 |
http://ur1.ca/o1ty4 Friday Squid Blogging: Squid Photos
|
|
schneier_sec
|
Oct 16, 2015 |
http://ur1.ca/o1slm Mapping FinFisher Users
|
|
schneier_sec
|
Oct 16, 2015 |
http://ur1.ca/o1lnl Breaking Diffie-Hellman with Massive Precomputation (Again)
|
|
schneier_sec
|
Oct 15, 2015 |
http://ur1.ca/o14gj Problems with DNA Evidence
|
|
schneier_sec
|
Oct 14, 2015 |
http://ur1.ca/o0sk1 On Cyber Arms Control Treaties
|
|
schneier_sec
|
Oct 14, 2015 |
http://ur1.ca/o0oc2 Obama Administration Not Pursuing a Backdoor to Commercial Encryption
|
|
schneier_sec
|
Oct 13, 2015 |
http://ur1.ca/o06oe Jamming Wi-Fi
|
|
schneier_sec
|
Oct 12, 2015 |
http://ur1.ca/nzns7 Soviet Spying on US Selectric Typewriters
|
|
schneier_sec
|
Oct 09, 2015 |
http://ur1.ca/nytmf NSA Patents
|
|
schneier_sec
|
Oct 08, 2015 |
http://ur1.ca/nyogw I'm a Guest on "Adam Ruins Everything"
|
|
schneier_sec
|
Oct 08, 2015 |
http://ur1.ca/nyo9j Friday Squid Blogging: Japanese Squid Recipe
|
|
schneier_sec
|
Oct 08, 2015 |
http://ur1.ca/nyl6v SHA-1 Freestart Collision
|
|
schneier_sec
|
Oct 08, 2015 |
http://ur1.ca/nyi0l Information in Your Boarding Pass's Bar Code
|
|
schneier_sec
|
Oct 07, 2015 |
http://ur1.ca/nxw7f European Court of Justice Rules Against Safe Harbor
|
|
schneier_sec
|
Oct 06, 2015 |
http://ur1.ca/nxfhg Autonomous Vehicles as Bombs
|
|
schneier_sec
|
Oct 05, 2015 |
http://ur1.ca/nx2bj Automatic Face Recognition and Surveillance
|
|
schneier_sec
|
Oct 02, 2015 |
http://ur1.ca/nwiri Friday Squid Blogging: Bobtail Squid Keeps Bacteria to Protect Its Eggs
|
|
schneier_sec
|
Oct 02, 2015 |
http://ur1.ca/nwhum Resilient Systems News
|
|
schneier_sec
|
Oct 02, 2015 |
http://ur1.ca/nwemp Stealing Fingerprints
|
|
schneier_sec
|
Oct 01, 2015 |
http://ur1.ca/nw7yc Existential Risk and Technological Advancement
|
|
schneier_sec
|
Oct 01, 2015 |
http://ur1.ca/nw5ti Identifying CIA Officers in the Field
|
|
schneier_sec
|
Sep 30, 2015 |
http://ur1.ca/nw1np The Era Of Automatic Facial Recognition And Surveillance Is Here
|
|
schneier_sec
|
Sep 30, 2015 |
http://ur1.ca/nw1jl Stealing Fingerprints
|
|
schneier_sec
|
Sep 30, 2015 |
http://ur1.ca/nw1jm VW Scandal Could Just Be the Beginning
|
|
schneier_sec
|
Sep 30, 2015 |
http://ur1.ca/nvy9t Spoofing Fitness Trackers
|
|
schneier_sec
|
Sep 30, 2015 |
http://ur1.ca/nvx2x Volkswagen and Cheating Software
|
|
schneier_sec
|
Sep 29, 2015 |
http://ur1.ca/nvmc5 How GCHQ Tracks Internet Users
|
|
schneier_sec
|
Sep 28, 2015 |
http://ur1.ca/nveqg Good Article on the Sony Attack
|
|
schneier_sec
|
Sep 25, 2015 |
http://ur1.ca/nuxt8 Friday Squid Blogging: Disney's Minigame Squid Wars
|
|
schneier_sec
|
Sep 25, 2015 |
http://ur1.ca/nux3x Anti-Alien Security
|
|
schneier_sec
|
Sep 25, 2015 |
http://ur1.ca/nutr5 People Who Need to Pee Are Better at Lying
|
|
schneier_sec
|
Sep 24, 2015 |
http://ur1.ca/nunnl Living in a Code Yellow World
|
|
schneier_sec
|
Sep 23, 2015 |
http://ur1.ca/nukbd Self-Destructing Computer Chip
|
|
schneier_sec
|
Sep 23, 2015 |
http://ur1.ca/nukaj Drone Speedboat
|
|
schneier_sec
|
Sep 23, 2015 |
http://ur1.ca/nuhto Hacking the Game Show "Press Your Luck"
|
|
schneier_sec
|
Sep 23, 2015 |
http://ur1.ca/nuhtw Living in Code Yellow
|
|
schneier_sec
|
Sep 23, 2015 |
http://ur1.ca/nuhtu History of Hacktivism
|
|
schneier_sec
|
Sep 23, 2015 |
http://ur1.ca/nuhtq Buying an Online Reputation
|
|
schneier_sec
|
Sep 14, 2015 |
http://ur1.ca/ns8il Security Cartoon
|
|
schneier_sec
|
Sep 14, 2015 |
http://ur1.ca/ns3a1 Programming Errors Weaken bcrypt Hashes of Ashley Madison Passwords
|
|
schneier_sec
|
Sep 11, 2015 |
http://ur1.ca/nr9e1 Friday Squid Blogging: The Chemistry of Squid Camouflage
|
|
schneier_sec
|
Sep 11, 2015 |
http://ur1.ca/nr80l Wanted: Cryptography Products for Worldwide Survey
|
|
schneier_sec
|
Sep 11, 2015 |
http://ur1.ca/nr3jn Drone Self-Defense and the Law
|
|
schneier_sec
|
Sep 10, 2015 |
http://ur1.ca/nqn2i FBI and Apple's Encryption
|
|
schneier_sec
|
Sep 09, 2015 |
http://ur1.ca/nqi8e Is It OK to Shoot Down a Drone over Your Backyard?
|
|
schneier_sec
|
Sep 09, 2015 |
http://ur1.ca/nqbpi Animals vs. Drones
|
|
schneier_sec
|
Sep 08, 2015 |
http://ur1.ca/npp2d TSA Master Keys
|
|
schneier_sec
|
Sep 07, 2015 |
http://ur1.ca/npavn Glenn Greenwald Debates Keith Alexander
|
|
schneier_sec
|
Sep 04, 2015 |
http://ur1.ca/nob1m Understanding Squid Self-Healing Teeth
|
|
schneier_sec
|
Sep 04, 2015 |
http://ur1.ca/no6kp China's "Great Cannon"
|
|
schneier_sec
|
Aug 28, 2015 |
http://ur1.ca/nl95v Mickens on Security
|