All you need to do and know about the “Spectre” and “Meltdown” vulnerabilities.
Nicholas Weaver is a senior staff researcher focusing on computer security at the International Computer Science Institute in Berkeley, California, and a lecturer in the Computer Science department at the University of California at Berkeley. All opinions are his own.
Subscribe to this Lawfare contributor via RSS.
FaceTime and iMessage have a cryptographic architecture that enables prospective wiretapping, but there is reason to believe that Apple not is fully complying with lawful pen-register and trap-and-trace court orders.
While the Shadow Brokers and Vault 7 leaks left trails of evidence behind them, there have been no arrests in the last eight months.
More research and development resources should be dedicated to preparing for defense against the non-military uses of unmanned autonomous weapons.
For the bulk of internet users, the WPA2 vulnerability is a non-issue.
Upgrades in Apple's forthcoming operating system update will complicate electronic search efforts at the border.
The proposed bill from Sens. Mark Warner, Cory Gardner, Ron Wyden and Steve Daines is a good first step in securing the Internet of Things and U.S. government systems in particular.