Update: More details have continued to come out, and I think that they generally support the less-paranoid version of events. There continues to be discussion on the mozilla.dev.security.policy list, Turktrust has given more details, and Mozilla has just opened up for public viewing their own detailed internal response documentation (including copies of all of the […]
Turktrust Certificate Authority Errors Demonstrate The Risk of "Subordinate" Certificates
Report on the NSF "Secure and Trustworthy Cyberspace" PI meeting
The National Science Foundation (NSF) Secure and Trustworthy Cyberspace (SaTC) Principal Investigator Meeting (whew!) took place Nov. 27-29, 2012, at the Gaylord Hotel just outside Washington, DC. The SaTC program is NSF’s flagship for cybersecurity research, although it certainly isn’t the only NSF funding in this area. The purpose of this blog posting is to […]
Where Are the Legal Lossless Downloads?
I must have been very nice last year, because Santa brought me a Sonos Connect Wireless HiFi System and Network Attached Storage (NAS) with Wake-on-LAN for Christmas. This particular combination of hardware can mean only one thing: I will spend the waning days of 2012 and the beginning days of 2013 ripping my entire CD […]
Technology & Nature – Perfect Together?
The ongoing recovery from Sandy’s devastating impact from the Caribbean to the East Coast of the U.S. – particularly New Jersey and New York – highlights for me the complex relationship between nature and technology. Satellite technology and meteorology were vital in predicting the storm and undoubtedly saved lives. No matter the accuracy of the […]
End-to-End Encrypted GMail? Not So Easy
Last week Julian Sanchez urged Google to offer end-to-end encryption for GMail, so that your messages would be known to you and your browser (and your email correspondents) but not to Google itself. Julian explained why this would be a positive step for users and, arguably, for Google itself. Let’s talk about what would be […]