For GRC Corporate News:Please see: blog.grc.com
- The “Encryption” Debate
- Yes… TrueCrypt is still safe to use.
- An Imagined Letter from the TrueCrypt Developer(s)
- Whither TrueCrypt?
- A quick mitigation for Internet Explorer’s new 0-day vulnerability
- The Lesson of Lavabit
- IronMan 3 was “Unbelievable”… but not in a good way.
- Reverse Engineering RSA’s “Statement”
- Why Firesheep’s Time Has Come
- Instant Hotspot Protection from “FireSheep”
Seems like only yesterday…
- (For those interested, the recent, now being exploited in the wild, local privilege elevation bug HAS been patched… twitter.com/i/web/status/1… / 1 week ago
- "Exploits & Updates" Security Now #680 Show Notes: bit.ly/2x3KkSV Lots of interesting and engaging news. (… twitter.com/i/web/status/1… / 1 week ago
- Security Now! #679 "SonarSnoop" Show Notes: bit.ly/2wI5YNi And, as ever... lots of interesting news of the week! :) / 2 weeks ago
- Remember last week's latest new Apache STRUTS vulnerability? Uh huh. Well, the bar has been forever raised on vulne… twitter.com/i/web/status/1… / 2 weeks ago
- "Never a Dull Moment" Security Now! Episode #678 Show Notes: bit.ly/2ohGKAE A "chock full of news" podcast… twitter.com/i/web/status/1… / 3 weeks ago
- 464,944 eyeball pairs
Copyright, Reuse, etc.Feel free to copy/paste anything here anywhere else. Attribution would be appreciated.
Author Archives: Steve Gibson
“Encryption” is quoted in the title of this essay because encryption is NOT what any of this is actually about. The debate is not about encryption, it’s about access. It should be called “The Device Access Debate” and encryption should … Continue reading
So opens the short editorial I wrote this morning and placed at the top of GRC’s new TrueCrypt Final Version Repository page. The impetus for the editorial was the continual influx of questions from people asking whether TrueCrypt was still … Continue reading
As I wrote yesterday, we know virtually nothing about the developer(s) behind TrueCrypt. So any speculation we entertain about their feelings, motives, or thought processes can only be a reflection of our own. With that acknowledgement, I’ll share the letter … Continue reading
My guess is that the TrueCrypt self-takedown is going to turn out to be legitimate. We know NOTHING about the developers behind TrueCrypt. Research Professor Matthew Green, Johns Hopkins Cryptographer who recently helped to launch the TrueCrypt Audit, is currently … Continue reading
The Internet industry press has been milking the news of the end of Windows XP support for much more than it’s worth. Now, over the weekend, we get news of another, in a continuing series of, (0-day) flaws in Internet … Continue reading
An implication of undeliverable security painted a bullseye…Post’s Permalink On Thursday, August 8th, Ladar Levison, the owner and operator of the semi-secure Lavabit.com eMail system, shut down his nearly ten year old service rather than be forced to continue to … Continue reading
My two-cent take on IronMan 3: This was a Disney/Marvel collaboration. Perhaps one problem was that it was too much Disney and insufficient Marvel. The thing I was conscious of at many points throughout the movie, was that in ridiculously … Continue reading