Differing Perspectives on Cyber Threats Ransomware is a hot topic pretty much all the time in information security circles. It is (I believe) one of the stronger drivers for better security decisions at companies (“here is public proof on an existential threat for failure”). Ransomware is also pretty uninspiring as an attack, there is no […]
Secured Android Smartphone
A Brief Spec and Overview I want to build a secured phone that can be used as either a hardened comms device, or even as a daily driver. I have a decade of experience in practical applied operational security, and over 5 years of experience working on secured Android phones. This project is my last attempt […]
Cheap Fakes beat Deep Fakes
Deepfakes are risky for information warfare, but exciting new capabilities for security Chocolate covered Brussel Sprouts I’ve always been sceptical of deepfakes. What are they good for? I’ve never understood the excitement over the perceived utility of deep fakes for disinformation in information warfare. Information warfare does not need deepfakes, cheapfakes are more than enough. Finally, someone […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- 6
- …
- 20
- Next Page »