Advanced persistent cybersecurity
Wednesday, December 09, 2020
The deal with DMCA 1201 reform
There are two fights in Congress now against the DMCA, the "Digital Millennium Copyright Act". One is over Section 512 covering &q...
Sunday, October 25, 2020
Why Biden: Principle over Party
There exist many #NeverTrump Republicans who agree that while Trump would best achieve their Party's policies, that he must nonetheless ...
Friday, October 16, 2020
No, that's not how warrantee expiration works
The NYPost Hunter Biden story has triggered a lot of sleuths obsessing on technical details trying to prove it's a hoax. So far, these...
No, font errors mean nothing in that NYPost article
The NYPost has an article on Hunter Biden emails . Critics claim that these don't look like emails, and that there are errors with the f...
Wednesday, October 14, 2020
Yes, we can validate leaked emails
When emails leak, we can know whether they are authenticate or forged. It's the first question we should ask of today's leak of ema...
Thursday, October 08, 2020
Factcheck: Regeneron's use of embryonic stem cells
This week, Trump's opponents misunderstood a Regeneron press release to conclude that the REG-COV2 treatment (which may have saved his l...
Saturday, September 12, 2020
Cliché: Security through obscurity (yet again)
Infosec is a largely non-technical field. People learn a topic only as far as they need to regurgitate the right answer on a certification t...
Sunday, July 19, 2020
How CEOs think
Recently, Twitter was hacked. CEOs who read about this in the news ask how they can protect themselves from similar threats. The following...
View web version