background preloader

Schneier on Security

Schneier on Security
This is an update to my earlier post. Cloudflare is reporting that it's very difficult, if not practically impossible, to steal SSL private keys with this attack. Here's the good news: after extensive testing on our software stack, we have been unable to successfully use Heartbleed on a vulnerable server to retrieve any private key data. Note that is not the same as saying it is impossible to use Heartbleed to get private keys. We do not yet feel comfortable saying that. However, if it is possible, it is at a minimum very hard.

http://www.schneier.com/

Related:  History, Geopolitics, Politics, & Truth Websites

Berghuis v. Thompkins (08-1470) Appealed from the United States Court of Appeals for the Sixth Circuit (Nov. 19, 2008) Oral argument: March 1, 2010 In February of 2001, Southfield, Michigan police officers questioned Van Chester Thompkins (“Thompkins”) for roughly three hours about a shooting that had occurred over one year prior. Ross Anderson's Home Page Ross Anderson [Research] [Blog] [Politics] [My Book] [Music] [Contact Details] What's New VATSIM - Pilot Resource Centre (PRC) Navigation Charts and Flight Planning Tools Created and Maintained by Neil Dewson-Smyth and Chad Black Last update 070121 - MB There are hundreds of places that navigation charts can be found, both on the internet and at local flying shops. The links provided on this page are for flight simulation use only and are not posted for use in real world aviation. Please note that all links are to external websites over which we have no control. Sites may be VATSIM related or in many cases are real world AIP (Aeronautical Information Publication) sites.

Kate Lucente Kate Lucente focuses her practice on issues related to privacy, data protection, data security, communications, e-commerce, telemarketing and marketing compliance. Kate helps companies achieve compliance with complex and rapidly evolving state, federal and international privacy, data security and e-commerce laws, and routinely advises national and multi-national companies on issues relating to privacy, data protection, security, marketing and media law issues. She also routinely prepares privacy policies and terms of service, negotiates cloud services and other business services agreements, and helps companies to analyze and respond to security breaches. Kate's experience also includes helping companies to analyze and implement records management programs, electronic discovery programs and whistleblower programs, from a multi-jurisdictional perspective.

Zombie Hasbara: 'World War Z' and Hollywood’s Zionist embrace Zombies rush the wall in World War Z. I went to the Drive-In in Atlanta Friday night, to celebrate a friend’s birthday, a beautiful night under an almost full moon. We watched This is The End and Fast and Furious 6, and two of us stayed for the 2:00 am screening of World War Z. I’m not a zombie fanatic, so other than watching the Walking Dead, I had few expectations beyond the trailers that have been on TV since the Super Bowl. So I was surprised, jarred out of the movie really, when right in the middle of the narrative, Brad Pitt’s character, Gerry Lane, travels to Israel and spends more than 10 minutes in a full-on pro-Israel propaganda piece that was as corny as it was crazy. The Times of Israel may be only slightly exaggerating when it calls this “the greatest piece of cinematic propaganda for Israel since Otto Preminger’s “Exodus.”

History of Computer Security Early Computer Security Papers, Part I This list of papers was initially distributed on CD-ROM at NISSC '98. These papers are unpublished, seminal works in computer security. They are papers every serious student of computer security should read. They are not easy to find. The goal of this collection is to make them widely available. Why Storytelling Is The Ultimate Weapon In business, storytelling is all the rage. Without a compelling story, we are told, our product, idea, or personal brand, is dead on arrival. In his book, Tell to Win, Peter Guber joins writers like Annette Simmons and Stephen Denning in evangelizing for the power of story in human affairs generally, and business in particular.

index ** We will be hosting a roundtable on the latest trends in Germany's data protection law. The roundtable will feature a number of representatives from Germany's data protection authorities and take place in Munich on 28-29 April 2014. This event is being hosted in conjunction with the Privacy Officers Network. Security Studies Program (SSP) A Defense Concept for Ukraine This paper was written by Professor Barry R. Posen twenty years ago. It was never published in English. Though the order of battle assumptions are no longer accurate, the basic architecture of the military problem remains.

Related:  Computer security