Updated: 2011-05-20 19:43:09
A vulnerability demonstration this week involving a technology that’s generating buzz reminded me of an important concept: Security is as much about implementation as the underlying technologies you use. You can put together several “secure” components and still build an insecure system. The example that reminded me of this relates to Bitcoin, a somewhat controversial [...]
Updated: 2011-05-09 17:37:29
Cameras and smart phones capture your location, but some sharing sites strip that information out. Also a link to an interview I did on this.
Updated: 2011-05-04 16:38:55
Time reports that Bin Laden’s computer contains a “mother lode of intel“. The article ends with the question: “The official posed the same question that’s likely on plenty of other people’s minds: ‘Can you imagine what’s on Osama bin Laden’s hard drive?’” The question on my mind is rather, with so much to lose, why [...]
Updated: 2011-04-28 14:24:00
If you haven’t heard already about the PlayStation Network compromise, you should pay attention if you have a PS3 and use PSN. Your PSN online ID, name, address and birthdate have all been compromised, and (potentially) your secret questions, and credit card numbers. What I don’t understand is why Sony can’t definitively tell us that [...]