To bleg: An entry on a blog requesting information or contributions. I have such a request. I recently came across this article: Trent Moore, DARPA DEVELOPING NEW COMPUTER CODE THAT IS EFFECTIVELY HACK-PROOF. Published by The Lawfare Institute in…
Earlier today, the Chinese government released its National Cybersecurity Strategy. A government news agency report on the release is here. According to the report: “China’s top Internet regulator released a cyberspace security strategy on Tuesday,…
Cybersecurity is, of course, very hard for any number of practical reasons, ranging from the complexity of the attack surface to the sophistication of persistent threats. And then, of course, there is the “theater of the absurd” division of reasons…
There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. There is much, of course, to be said about the reported Russian intrusion into various aspects of our electoral system. From the…
Last week, co-blogger Nick Weaver posted a short summary of why he holds the view that Apple products are safe, but that Android products systematically are not. His recommendation was to throw your Android phone in the garbage and he asked, somewhat…