Certificate transparency: should the certificate be submitted to ct-logs if the pre-certificate is already submitted

If a pre-certificate is generated and submitted to certificate transparency logs, the final certificate can include SCT receipts.

So the final certificate doesn’t need to be submitted to ct-logs in order to be valid in brows… Continue reading Certificate transparency: should the certificate be submitted to ct-logs if the pre-certificate is already submitted

Expressing the risk of not having a security policy (e.g. ISO 27002, chapter 5)

How do I express non-compliance to ISO 27002 chapter 5 as a risk?

The basic principle of an ISMS according to ISO 27001 is a risk-based approach. Following this, every control of Annex A (ISO 27002) needs to be evaluated and included or (… Continue reading Expressing the risk of not having a security policy (e.g. ISO 27002, chapter 5)

If I’ve no WhatsApp account am I still a node on their social graph? And if so can I request to be deleted? [on hold]

I have never used WhatsApp so I have never shared my phone’s contacts with them or consented to their terms. Many of my friends and family do use WhatsApp and they will all have me in thier contacts under the same name and ph… Continue reading If I’ve no WhatsApp account am I still a node on their social graph? And if so can I request to be deleted? [on hold]