Tag Archives: Security

France Makes The Right Choice

Some Americans like to make fun of the French but they’ve recently shown that they’ve got it together a lot more than many governments. The EFF is reporting that France recently rejected a backdoor mandate greatly desired by the Interior … Continue reading

Posted in General | Tagged | Leave a comment

Age Verification

I often say on Irreal that any time you hear the phrase “think of the children” you should check to make sure you still have your wallet. It’s a favorite locution of scoundrels who want to steal not your wallet … Continue reading

Posted in General | Tagged , | Leave a comment

Is Emacs Privacy Friendly?

Over at the Emacs subreddit, Tb12s46 asks if Emacs is privacy friendly. By that he means does Emacs collect telemetry or otherwise spy on its users. On its face, the question has an easy answer. Of course Emacs doesn’t do … Continue reading

Posted in General | Tagged , | Leave a comment

The Other Shoe Drops: Apple Responds

A little less than two weeks ago I wrote about the UK’s Quixotic efforts to get a back door into Apple’s end-to-end encryption for all users worldwide. They issued a secret order—immediately revealed, of course—ordering Apple to let them spy … Continue reading

Posted in General | Tagged | Leave a comment

Apparently Not Everyone Gets The Irony

At this point, I’m old enough that you’d think I’d know not to believe that governments could ever learn their lesson. But no, it just isn’t so. A month ago I was all warm and fuzzy about the fact that … Continue reading

Posted in General | Tagged | Leave a comment

Pins And Their Distribution

If you’re a reasonably connected person—not geek, person—your smartphone is the gateway to your life. It provides access to your bank accounts and other financial information, your on-line shopping accounts, your contacts, your email and chat history, and all other … Continue reading

Posted in General | Tagged | Leave a comment

CISA Best Practices for Mobile Communications

Recently, The Cybersecurity and Infrastructure Security Agency (CISA) released some best practices for mobile communications. These are the result of the recent exploits attributed to The People’s Republic of China. While the recommendations were targeted at senior government officials, they … Continue reading

Posted in General | Tagged | Leave a comment

Law Enforcement Discovers Irony

For years, anyone with a reasonable knowledge of the situation and no ax to grind has been preaching the gospel that today’s on-line society needs strong, end-to-end encryption for the safe conduct of our electronic activities. At the same time, … Continue reading

Posted in General | Tagged | Leave a comment

Passwords And Their Problems

In response to my recent post on How Passwords Are Stolen, Smitty remarked that the bar for brute forcing your credentials is lowering. I agreed and remarked that passwords are well past their sell-by date. Unfortunately, although some reasonable alternatives … Continue reading

Posted in General | Tagged | Leave a comment

How Passwords Are Stolen

As most you know by now, I live a digital life as much as possible. I pay my bills, do my banking, order my food and other shopping, communicate with friends and family, and get my news electronically. For someone … Continue reading

Posted in General | Tagged | Leave a comment