Please remember that email is not a secure communications medium. Do not say anything in an email that you would not be comfortable seeing on a bathroom wall or on CNN.
Please remember that email is not a secure communications medium. Do not say anything in an email that you would not be comfortable seeing on a bathroom wall or on CNN.
I made a bad move when I used HJ Hornbeck’s posting on bayesian reasoning about Russian hacking as a jumping-off point for a critique of using bayesian reasoning to attempt to predict events.
This is a pretty fair view into what the high-end hacker’s existence is like. There are blurry lines everywhere, so it’s a bit hard to even say what is “hacking” versus “marketing” or “information operations” – it’s complicated.
When I first stumbled across the works of Tatjana Van Vark, back in the ’90s, I was completely blown away. I still am, and I check her site every year or so to see if she’s published anything new.
To get to Lavecon, I took the midlands train from London/Euston up toward Birmingham, and got off at Northampton. On the way up, I went past Bletchley, the home of Bletchley Park – where the British code-breakers (including Alan Turing) worked during WWII.
I clicked on the folder for my media archive, so I could paste the images I wanted to save off my iPhone, and instead I just got a spinning icon.
I’ve decided to celebrate June 10 as Facial Recognition Day. On this day, every year, I will try to think of some way to interfere with facial recognition.
I pointed this problem out during my “cyberwar is bullshit” talk at RSA conference in 2012: once you begin using your cyberweapons, they become subject to commercial pressures: and competitive analysis.
In the wake of the latest terror attack, Theresa May was quick to begin banging the surveillance state’s favorite rhythm.
Putin may be great at the dictating and the judo, but for a former KGB officer, his trade-craft is not very good.