"Security for the High-Risk User"
Interesting paper. John Scott-Railton on securing the high-risk user…. Continue reading "Security for the High-Risk User"
Collaborate Disseminate
Interesting paper. John Scott-Railton on securing the high-risk user…. Continue reading "Security for the High-Risk User"
Interesting research that shows we exaggerate the risks of something when we find it morally objectionable. From an article about and interview with the researchers: To get at this question experimentally, Thomas and her collaborators created a series of vignettes in which a parent left a child unattended for some period of time, and participants indicated the risk of harm… Continue reading Confusing Security Risks with Moral Judgments
Andrew Appel has a good two-part essay on securing elections. And three organizations — Verified Voting, EPIC, and Common Cause — have published a report on the risks of Internet voting. The report is primarily concerned with privacy, and the threats to a secret ballot…. Continue reading More on Election Security
This interesting essay argues that financial risks are generally not systemic risks, and instead are generally much smaller. That’s certainly been our experience to date: While systemic risk is frequently invoked as a key reason to be on guard for cyber risk, such a connection is quite tenuous. A cyber event might in extreme cases result in a systemic crisis,… Continue reading Financial Cyber Risk Is Not Systemic Risk
This is good: Threats constantly change, yet our political discourse suggests that our vulnerabilities are simply for lack of resources, commitment or competence. Sometimes, that is true. But mostly we are vulnerable because we choose to be; because we’ve accepted, at least implicitly, that some risk is tolerable. A state that could stop every suicide bomber wouldn’t be a free… Continue reading Smart Essay on the Limitations of Anti-Terrorism Security
Thefts of personal information aren’t unusual. Every week, thieves break into networks and steal data about people, often tens of millions at a time. Most of the time it’s information that’s needed to commit fraud, as happened in 2015 to Experian and the IRS. Sometimes it’s stolen for purposes of embarrassment or coercion, as in the 2015 cases of Ashley… Continue reading Data Is a Toxic Asset