For GRC Corporate News:Please see: blog.grc.com
- The “Encryption” Debate
- Yes… TrueCrypt is still safe to use.
- An Imagined Letter from the TrueCrypt Developer(s)
- Whither TrueCrypt?
- A quick mitigation for Internet Explorer’s new 0-day vulnerability
- The Lesson of Lavabit
- IronMan 3 was “Unbelievable”… but not in a good way.
- Reverse Engineering RSA’s “Statement”
- Why Firesheep’s Time Has Come
- Instant Hotspot Protection from “FireSheep”
Seems like only yesterday…
- Anyone seeking background info about the Apple 0-day patches before next week's Security Now! podcast, please see: bit.ly/2bsgUTC / 1 day ago
- Apple recently pushed an "emergency" update for all iOS devices. It has been used against "targeted victims", but could see wider use now. / 1 day ago
- Show notes for Security Now! #574: "News, Router Hardware & Micro Kernels". Another jam-packed week of fun stuff! bit.ly/2bkd9jd / 3 days ago
- Win10 holdouts (not to mention corporations) would likely appreciate the EFF’s take on choice and privacy tradeoffs: eff.org/deeplinks/2016… / 1 week ago
- If these notes are any indication, this is going to be a GREAT podcast! Security Now #573 News, Memory, MicroKernels bit.ly/2bg43Ts / 1 week ago
- 444,443 eyeball pairs
Copyright, Reuse, etc.Feel free to copy/paste anything here anywhere else. Attribution would be appreciated.
Category Archives: Uncategorized
“Encryption” is quoted in the title of this essay because encryption is NOT what any of this is actually about. The debate is not about encryption, it’s about access. It should be called “The Device Access Debate” and encryption should … Continue reading
So opens the short editorial I wrote this morning and placed at the top of GRC’s new TrueCrypt Final Version Repository page. The impetus for the editorial was the continual influx of questions from people asking whether TrueCrypt was still … Continue reading
As I wrote yesterday, we know virtually nothing about the developer(s) behind TrueCrypt. So any speculation we entertain about their feelings, motives, or thought processes can only be a reflection of our own. With that acknowledgement, I’ll share the letter … Continue reading
My guess is that the TrueCrypt self-takedown is going to turn out to be legitimate. We know NOTHING about the developers behind TrueCrypt. Research Professor Matthew Green, Johns Hopkins Cryptographer who recently helped to launch the TrueCrypt Audit, is currently … Continue reading
The Internet industry press has been milking the news of the end of Windows XP support for much more than it’s worth. Now, over the weekend, we get news of another, in a continuing series of, (0-day) flaws in Internet … Continue reading
An implication of undeliverable security painted a bullseye…Post’s Permalink On Thursday, August 8th, Ladar Levison, the owner and operator of the semi-secure Lavabit.com eMail system, shut down his nearly ten year old service rather than be forced to continue to … Continue reading
My two-cent take on IronMan 3: This was a Disney/Marvel collaboration. Perhaps one problem was that it was too much Disney and insufficient Marvel. The thing I was conscious of at many points throughout the movie, was that in ridiculously … Continue reading