Alienating Cyberspace
The defense the US Government has used to defend and justify its recently disclosed surveillance activities is that such efforts focus solely on identifying those outside the United States who seek to harm the country.…
The defense the US Government has used to defend and justify its recently disclosed surveillance activities is that such efforts focus solely on identifying those outside the United States who seek to harm the country.…
I watched a few video replays today of that terrible morning twelve years ago when our nation was attacked. I remembered how shaken our world was after the day’s events, how nothing seemed certain anymore,…
I feel a little better now. After blogging about how my world was coming to an end because my faith in the mathematics of encryption had been shaken, a graduate of ours who read my…
To paraphrase the 1991 video game Zero Wing, “all your [bytes] are belong to us” Even if you think you’ve encrypted your data like a good Internet citizen should, you’re pwned.. At least that’s what the…
Whenever I install a new version of the Java Development Kit on a machine, I chuckle at the splash screen that boldly brags “Over 3 Billion Devices Run Java”. To me, that loosely translates to…