Handset Security Flaws On The HorizonSoftware quality, especially data input filtering, is critical for mobile devices; especially devices that do not typically have user-updateable software.23 May 2003 • 1 min read
Drm Threat Analysis Shows Futility In Drm MechanismsThis analysis shows how DRM solutions are ineffective because they [attempt to] address the wrong threat model.23 May 2003 • 1 min read
Acm Testimony To Congress Against Dmca'S Chilling EffectUSACM co-chair Barbara Simons spoke out against sections of the DMCA during recent Congressional review of the DMCA’s anti-circumvention provisions.23 May 2003 • 1 min read
Anti PolygraphHere is a 176-page PDF paper on the fallacy of polygraph exams (a.k.a. “lie” detectors). I have not read up on this subject in some time but this looks to be a good read.19 May 2003 • 1 min read
Stupid SecurityFound out about this great site through this month’s Crypto-Gram newsletter. It posts articles on – you guessed it – all the stupid security measures people come across.19 May 2003 • 1 min read
E Voting Systems AssailedA great article with some perfect quotes from leading advocates and experts for voter verifiable audit trails. Also, there are some documented cases of voting machine errors in the article.6 May 2003 • 3 min read
Analysis Of The Educational Initiatives Outlined In The National Cybersecurity StrategyRob Slade takes an in-depth look at what the National Cybersecurity Strategy is for security education and doesn’t really find much. To summarize:21 Mar 2003 • 1 min read