Cities, Disneyland, and Software Security

Cities, Disneyland, and Software Security

| | assurance, flaws, risks, security
I like to think of our modern software infrastructure as being like a large city and posing the same trade-offs between risk and reward. We don’t wander carelessly around cities because of ...
libhairshirt vs libfootgun

libhairshirt vs libfootgun

| | Crypto, flaws, security
 Peter Gutmann, an interesting crypto-academic from New Zealand, has proposed discussing two crypto libraries, libhairshirt and libfootgun:  In libhairshirt, the crypto is hard to use, and the API is hard to use ...
Old Story: Leaked Voter Records

Old Story: Leaked Voter Records

My previous posting on the Proud Boys spam email speculated that voter records were widely available for such purposes. Here’s a story from 2017 reporting that voter data for about 198 million ...
Life Cycle of a Security Bug

Life Cycle of a Security Bug

| | attacks, flaws, security, zero-day
Unlike members of the insect family, computer software bugs live forever. Software security bugs (well, flaws) are especially troubling since they demand respect from every software developer now and forever. We want ...
The Six Types of Cyberattacks

The Six Types of Cyberattacks

My textbook talks about attacks on computers and computer networks using specific categories. A successful attack goes through many phases. These categories focus on an attack’s lasting impact: how does it affect ...