For GRC Corporate News:Please see: blog.grc.com
- The “Encryption” Debate
- Yes… TrueCrypt is still safe to use.
- An Imagined Letter from the TrueCrypt Developer(s)
- Whither TrueCrypt?
- A quick mitigation for Internet Explorer’s new 0-day vulnerability
- The Lesson of Lavabit
- IronMan 3 was “Unbelievable”… but not in a good way.
- Reverse Engineering RSA’s “Statement”
- Why Firesheep’s Time Has Come
- Instant Hotspot Protection from “FireSheep”
Seems like only yesterday…
- "KRACKing WiFi" Security Now! #633 Show Notes: bit.ly/2yptl00 Full coverage of the KRACK and ROCA attacks/vulnerabilities today. / 3 days ago
- KRACK - Another important point I'll be making during the podcast is that CLIENTs =not= Access Points are largely what needs to be patched. / 3 days ago
- Also: Mistakes made by Microsoft and Apple largely prevent the attacks. Unpatched Android is the bigger worry. But what else is new? / 3 days ago
- Short Version: WPA2 is not dead. Only a single boolean flag needs to be added to code to prevent the attack. And TLS/HTTPS still saves us. / 3 days ago
- Tomorrow's Security Now! will provide full and deep coverage of BOTH the KRACK and ROCA attacks. :)~ / 4 days ago
- 458,029 eyeball pairs
Copyright, Reuse, etc.Feel free to copy/paste anything here anywhere else. Attribution would be appreciated.
Category Archives: Uncategorized
“Encryption” is quoted in the title of this essay because encryption is NOT what any of this is actually about. The debate is not about encryption, it’s about access. It should be called “The Device Access Debate” and encryption should … Continue reading
So opens the short editorial I wrote this morning and placed at the top of GRC’s new TrueCrypt Final Version Repository page. The impetus for the editorial was the continual influx of questions from people asking whether TrueCrypt was still … Continue reading
As I wrote yesterday, we know virtually nothing about the developer(s) behind TrueCrypt. So any speculation we entertain about their feelings, motives, or thought processes can only be a reflection of our own. With that acknowledgement, I’ll share the letter … Continue reading
My guess is that the TrueCrypt self-takedown is going to turn out to be legitimate. We know NOTHING about the developers behind TrueCrypt. Research Professor Matthew Green, Johns Hopkins Cryptographer who recently helped to launch the TrueCrypt Audit, is currently … Continue reading
The Internet industry press has been milking the news of the end of Windows XP support for much more than it’s worth. Now, over the weekend, we get news of another, in a continuing series of, (0-day) flaws in Internet … Continue reading
An implication of undeliverable security painted a bullseye…Post’s Permalink On Thursday, August 8th, Ladar Levison, the owner and operator of the semi-secure Lavabit.com eMail system, shut down his nearly ten year old service rather than be forced to continue to … Continue reading
My two-cent take on IronMan 3: This was a Disney/Marvel collaboration. Perhaps one problem was that it was too much Disney and insufficient Marvel. The thing I was conscious of at many points throughout the movie, was that in ridiculously … Continue reading