What Could Possibly Go Wrong With Backdoors?
What could possibly go wrong with back doors? Pretty much everything imaginable. You must have seen about the debate between the FBI and Apple over providing a backdoor for the Apple iPhone 5C model. I strongly agree with Michael Hayden, former head of both the Central Intelligence Agency and the National Security Agency. In an […]
Back Doors Always Become Open Doors
We know back doors get built into systems because sooner or later they’re abused in ways that often grab our attention. Keep in mind that any ”password recovery” system accomplishes something that would not be possible within a system that really protects confidentiality. There is a tradeoff between confidentiality and availability. The stronger the protection […]
Is Your Wi-Fi Router a Chameleon?
Most of us have some kind of anti-virus and intrusion detection system on our home and business computers. (If you don’t, you should!) These systems work to prevent intrusions on our systems. We run them on workstations and servers and trust them to protect our networks against certain types of threats. But our embedded systems […]
My New Year’s Resolution: Use Cloud Backup
It’s the time of year to think about those plans for making the next year better — lose weight, quit smoking, learn some new skill. Here’s what I’m urging people to do: take advantage of very inexpensive and easy-to-use cloud storage services and make backup copies of your precious personal data. Digital photographs and movies, […]
Encryption is ”Exponentially Easier” to Break, But What Does That Really Mean?
In Learning Tree’s System and Network Security Introduction course we talk a little about risk management. Unless you can put numbers on a thing, it’s hard to discuss it or plan for it (or plan how to avoid it!) in a meaningful way. A startling result from late summer is still getting some attention. It’s […]