The Privacy BlogPrivacy, Security, Cryptography, and Anonymity

TAG | security architecture

Since it was introduced, Apple has had the ability to decrypt the contents if iPhones and other iOS devices when asked to do so (with a warrant). Apple recently announced that with iOS 8 Apple will no longer be able to do so. Predictably, there has been a roar of outrage from many in law […]

· · ·

The Washington Post has a good article on social engineering attacks. It is a good treatment of the topic. Short answer, humans are the weak link, and can be defeated with extremely high probability. The take away from this whole thing is that we need to be building security systems that don’t rely on humans […]

· ·