Advanced persistent cybersecurity
Friday, March 06, 2020
Huawei backdoors explanation, explained
Today Huawei published a video explaining the concept of "backdoors" in telco equipment. Many are criticizing the video for being ...
Wednesday, March 04, 2020
A requirements spec for voting
In software development, we start with a "requirements specification" defining what the software is supposed to do. Voting machine...
Tuesday, January 28, 2020
There's no evidence the Saudis hacked Jeff Bezos's iPhone
There's no evidence the Saudis hacked Jeff Bezos's iPhone. This is the conclusion of the all the independent experts who have revi...
How to decrypt WhatsApp end-to-end media files
At the center of the "Saudis hacked Bezos" story is a mysterious video file investigators couldn't decrypt, sent by Saudi Crow...
Sunday, December 29, 2019
So that tweet was misunderstood
I'm currently experiencing the toxic hell that is a misunderstood tweet going viral. It's a property of the social media. The more t...
Friday, December 13, 2019
This is finally the year of the ARM server
"RISC" was an important architecture from the 1980s when CPUs had fewer than 100,000 transistors. By simplifying the instruction s...
Thursday, September 26, 2019
Trump's conversation with the President of Ukraine mentions "CrowdStrike". I thought I'd explain this. What was said? ...
Saturday, August 31, 2019
Thread on the OSI model is a lie
I had a Twitter thread on the OSI model . Below it's compiled into one blogpost
Thread on network input parsers
This blogpost contains a long Twitter thread on input parsers . I thought I'd copy the thread here as a blogpost. I am spending f...
View web version