Are Consumer Crypto Systems Too Hard To Use?
In a previous post, I summarized some academic papers in which prominent cryptographers and other security experts took a very skeptical look at current cryptography, both research and practical...
View ArticleCyber Security Requires Cautious Logic
If we don’t carefully distinguish between necessary and sufficient when we are analyzing information assurance systems, we may become dangerously confident in a system that is actually quite weak. This...
View ArticleHow Will Vehicle-To-Everything (V2X) Communication Transform Your Car?
A casual mention of Vehicle to Everything, or V2X, in a mailing list, led me to a short article, and that led to much more. It made me aware of a project that may make huge changes to how we get...
View ArticleHow I Was Wrong About Kerberos
Microsoft’s Active Directory includes a version of Kerberos that has had a bad reputation. There were problems several years ago, but the criticisms are now outdated. What was the problem, and how has...
View ArticleHow To Enter The Cyber Security Field
During Cyber Security Awareness Month we hear about how important being #CyberAware is. “Do your part! Be careful!” It’s important to take this seriously. But additionally, this field offers job...
View Article
More Pages to Explore .....