Posted by david b. on August 26, 2014
Mudge now shares some of his thoughts about why the Government tends to stay with the same contractors even after their tech findings have been compromised.
3. Game theory is a bitch
My third story is … well, let me...
Posted by david b. on August 23, 2014
Another story by Mudge is about how blurred and poorly worded statements of the Government agencies can pull off cyber attacks by movements like Anonymous.
2. Department of Defense vs. Anonymous
The second story is...
Posted by david b. on August 20, 2014
Peiter C. Zatko, aka Mudge, a well-known former member of the L0pht and ex-researcher at DARPA, tells a few stories from his past experience at Defcon.
Just so we’re clear, I’m only speaking as myself today. I am...
Posted by david b. on August 8, 2014
Winding up with the Defcon talk, Chris Soghoian highlights the merits of the companies that focus on user data security rather than usability only.
The FBI has this team of agents who are doing nothing but...
Posted by david b. on August 3, 2014
ACLU’s Chris Soghoian now delves into how he discovered the activities of contractor company employees supporting the Government’s hacking endeavors.
What about the Feds?
The feds have the big bucks, federal law...
Posted by david b. on August 1, 2014
Chris Soghoian’s focus in this entry is on private sector companies providing assistance to the government by developing tools for intercepting communications.
Alright, so if they can’t force...
Posted by david b. on July 28, 2014
Chris Soghoian zeroes in on the government’s attempts to circumvent privacy measures by the Silicon Valley companies that all came to employ encryption.
Silicon Valley vs. telco surveillance
What we have seen in the...
Posted by david b. on July 24, 2014
Delving further into crypto evolution, Chris Soghoian focuses on the relationship between law enforcement and companies that adopted strong privacy algos.
And so, things were good for a while. It didn’t...