Category: Security Research
-
AHA! A blast from the past…
I just ran across this great blog post from Lori MacVittie at Web2.0 Journal. Can’t say exactly why it sparked my interest, but after reading it I realized this may be Freudian… The proposed Anonymous Human Authentication (AHA – great acronym Lori!) proposed in it closely resembles a technology we worked on back in the days…
-
ExcaliburCon summary and general China notes
So, It’s been quite some time since ExcaliburCon has been concluded, and I have been delaying this post due to some other work related activities that jumped on me right as I landed back home. Anyway, I’ll try to cover as much as I can remember (thanks to a cumulative photographic memory of all the…
-
Clouds, and the winds that blows them away…
You must have seen this coming – I was holding off from discussing cloud security for quite some time for a few good reasons, but now it’s time to take a look at where are we (or more correctly – are we there yet?). First things first – the main reason for abstaining from the…