Privacy on iPhone — Simple as that — Apple

Introducing iVerify, the security toolkit for iPhone users

“If privacy matters, it should matter to the phone your life is on.” So says Apple in their recent ads about Privacy on the iPhone and controlling the data you share—but many ...
44917824762_dc1fa21afd_k

10 Rules for the Secure Use of Cryptocurrency Hardware Wallets

| | blockchain, Guides
Earlier this year, the Web3 Foundation (W3F) commissioned Trail of Bits for a security review and assessment of the risks in storing cryptocurrency. Everyone who owns cryptocurrency — from large institutions to ...

How to Spot Good Fuzzing Research

| | fuzzing, Guides
Of the nearly 200 papers on software fuzzing that have been published in the last three years, most of them—even some from high-impact conferences—are academic clamor. Fuzzing research suffers from inconsistent and ...

How to prepare for a security audit

| | Guides, Meta
You’ve just approved an audit of your codebase. Do you: Send a copy of the repository and wait for the auditors’ reports, or Take the extra effort to set the auditors up ...