Those hypotheticals about voting machines being insecure? Hand me that tinfoil…
Those hypotheticals about voting machines being insecure? Hand me that tinfoil…
Offensive strategies are good if (and only if) you have an identifiable, small, number of foes that you can dominate.
Bob Moore asks me to comment on an article about propaganda and security/intelligence. [article] This is going to be a mixture of opinion and references to facts; I’ll try to be clear which is which.
Someone who cares about bitcoin more than I do checked the transaction history for the bitcoin wallet provided by the “hacker gang” and it doesn’t look like they have collected any bitcoin with this scam.
Darn this tinfoil chin-strap, it’s hard to keep everything in position. Okay, I think I’ve got it. Ready?
For the last decade, the US military has been hinting that it would like to be able to be more aggressive in cyberspace.
This is a true story of how I got a Message From The Swedish Prime Minister.
“Does anyone here know anything about ‘firewalls’?” asked Steve Walker, the CEO of Trusted Information Systems (TIS). If you read Mechanizing Proof [stderr] stw crops up a couple of times – he was one of the proponents of trustworthy design through formal verification, and TIS produced an evaluated version of UNIX known as Trusted Xenix.
The problem with the space station (it was leaking air) has been identified. From there, the story gets bizzare. [guard]
Computer security is a new(ish) field, so we get to make up names for things. That’s an advantage and a disadvantage – it means that marketing people can come up with new-sounding names for old stuff, and sometimes customers get all excited and buy it because it sounds so new!