Internet and e-mail policy and practice
including Notes on Internet E-mail


2018
Months
JulAug
Sep Oct
Nov Dec

Click the comments link on any story to see comments or add your own.


Subscribe to this blog


RSS feed


Home :: Security

21 May 2018

Schneier and Kerr on Encryption Workarounds Security
Bruce Schneier is a famous cryptography expert and Orin Kerr a famous cyberlaw professor. Together they've published a law journal article on
Encryption Workarounds. It's intended for lawyers so it's quite accessible to non-technical readers.

See more ...


posted at: 15:27 :: permanent link to this entry :: 1 comments
Stable link is https://www.jl.ly/Security/encwork.html

26 Aug 2017

Not quite two factor, or is your phone number really something you have? Security

A recent article in the New York Times Dealbook column reported on phone number hijacking, in which a bad guy fraudulently takes over someone's mobile phone number and used it to reset credentials and drain the victim's account. It happens a lot, even to the chief technologist of the FTC. This reminds us that security is hard, and understanding two factor authentication is harder than it seems.

The usual definition of two-factor is to pick two different items from a list of security types:

See more ...


posted at: 20:49 :: permanent link to this entry :: 0 comments
Stable link is https://www.jl.ly/Security/2fphone.html

Topics


My other sites

Who is this guy?

Airline ticket info

Taughannock Networks

Other blogs

CAUCE
CAUCE Welcomes Two New Board Members - Tom Grasso and Allison Nixon
221 days ago

A keen grasp of the obvious
Derby Day
74 days ago

Related sites

Coalition Against Unsolicited Commercial E-mail

Network Abuse Clearinghouse



© 2005-2018 John R. Levine.
CAN SPAM address harvesting notice: the operator of this website will not give, sell, or otherwise transfer addresses maintained by this website to any other party for the purposes of initiating, or enabling others to initiate, electronic mail messages.