Advanced persistent cybersecurity
Wednesday, June 14, 2017
Notes on open-sourcing abandoned code
Some people want a law that compels companies to release their source code for "abandoned software", in the name of cybersecurity...
Tuesday, June 06, 2017
What about other leaked printed documents?
So nat-sec pundit/expert Marci Wheeler ( @emptywheel ) asks about those DIOG docs leaked last year. They were leaked in printed form, then s...
Monday, June 05, 2017
How The Intercept Outed Reality Winner
Today, The Intercept released documents on election tampering from an NSA leaker. Later, the arrest warrant request for an NSA contractor ...
Some non-lessons from WannaCry
This piece by Bruce Schneier needs debunking. I thought I'd list the things wrong with it.
Saturday, June 03, 2017
How to track that annoying pop-up
In a recent update to their Office suite on Windows, Microsoft made a mistake where every hour, for a fraction of a second, a black window ...
Tuesday, May 30, 2017
I want to talk for a moment about tolerance
This post is in response to this Twitter thread. I was going to do a series of tweets in response, but as the number grew, I thought it'...
Monday, May 22, 2017
Houston we have a problem!
Of the many undesirable results of the Space Program is the fetishization of the "mission control center", with it's rows o...
Friday, May 12, 2017
Some notes on Trump's cybersecurity Executive Order
President Trump has finally signed an executive order on "cybersecurity" . The first draft during his first weeks in power were hi...
View web version