Helping Users Understand Cybersecurity: Integrity Becomes Accuracy
In a previous blog post I explained how I thought that ”Privacy” was a better term than ”Confidentiality” when we are communicating with non-specialists. Everyday users must play their role in protecting information. This is part of my heretical suggestion that we would should replace ”CIA” with ”PAR”, as in Privacy, Accuracy, and Reliability. What […]
How Will Vehicle-To-Everything (V2X) Communication Transform Your Car?
A casual mention of Vehicle to Everything, or V2X, in a mailing list, led me to a short article, and that led to much more. It made me aware of a project that may make huge changes to how we get around. Roads can measure cars in very limited ways today with inductive loops at […]
Are You Absolutely Certain That You Have The Real Source Code?
Why would you want to build a Linux kernel? Maybe you realize that there’s a local root exploit possible on your kernel version. Maybe you want to take advantage of improved storage performance or extended network capability. Maybe you need a very specific kernel version to support a combination of your motherboard hardware plus network […]
New Year’s Resolution: How to Back Up Your Data
Last week I encouraged you to use Amazon’s cheap and extremely resilient Glacier service to archive your personal data. Let’s see how to do this. Glacier uses the same storage technology as S3, for just one-tenth the cost. The primary trade-off is that Glacier is intended for archiving data, not using it, and to get […]
What Does The Recent SHA-1 Attack Mean For You And Your Organization?
Some top cryptographers have recently announced a significant step toward breaking the SHA-1 hash algorithm. Their work is described here and here, and also check out their paper. What does this mean for you and your organization? Let me start with a bit of background so the following makes sense. What Is A Hash? A […]