This is a paraphrasing of an actual question that I got a few weeks ago. Online privacy is a challenging subject for practitioners. On the one hand most people are…

This is a paraphrasing of an actual question that I got a few weeks ago. Online privacy is a challenging subject for practitioners. On the one hand most people are…
I have observed some confusion as to how WhatsApp secures user information when peoples’ phone numbers change or are recycled by phone service providers. Someone I knew (Alice) started using…
I was asked this question yesterday, and tried to come up with something brief but which captures the essentials. Spoiler: I did not succeed 100% in the former. This is…
I have written about passwords a bunch of times before, mostly arguing in favour of password managers and against rules regarding password complexity and periodic password change. An increasingly growing group…
I’m happy that blood test provider Theranos is shutting down. The hype it generated took a life of its own and possibly enabled its founder to continue with fraud for…
The use of password managers is gaining traction as people realise the intractability of storing unique long passwords in memory. There are some challenges related to password managers that you…
Blockchain is a promising technology that has made a lot of geeks rich in a short period of time. At the same time, the lack of regulations and knowledge surrounding…
Google is leading the push to an encrypted and more secure internet. The Chrome browser’s security team is changing the way Google Chrome handles web pages, with Firefox playing catchup.…
I recently moved to Hong Kong and was the mark of a scammer who tried to cheat me of rental deposit. I lost no money, just a bit of time…
The Cuckoo’s Egg (1989) is probably THE classic true computer security incident response story. Cliff Stoll, a man with a doctorate in astronomy, gets a job maintaining the computer systems…