June, 2013 - syn_schneier

Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Month View
Here are the subjects of all posts in the [info]syn_schneier journal in June, 2013.


3rd
6:15a[info]syn_schneierThe Problems with Managing Privacy by Asking and Giving Consent
4th
6:19a[info]syn_schneierThe Security Risks of Unregulated Google Search
12:44p[info]syn_schneierThe Problems with CALEA-II
5th
7:20a[info]syn_schneierSecurity and Human Behavior (SHB 2013)
1:11p[info]syn_schneierEugene Spafford Answers Questions on CNN.com
6th
5:58a[info]syn_schneierThe Cost of Terrorism in Pakistan
7th
6:41a[info]syn_schneierA Really Good Article on How Easy it Is to Crack Passwords
2:22p[info]syn_schneierAudio Interview with Me
4:35p[info]syn_schneierFriday Squid Blogging: Squid Comic
10th
6:12a[info]syn_schneierGovernment Secrets and the Need for Whistle-blowers
12:50p[info]syn_schneierTagging and Location Technologies
11th
6:21a[info]syn_schneierTrust in IT
12:30p[info]syn_schneierThe Psychology of Conspiracy Theories
12th
6:16a[info]syn_schneierProsecuting Snowden
13th
6:09a[info]syn_schneierEssays Related to NSA Spying Documents
11:34a[info]syn_schneierMore on Feudal Security
4:06p[info]syn_schneierTrading Privacy for Convenience
14th
7:15a[info]syn_schneierRicin as a Terrorist Tool
12:20p[info]syn_schneierSixth Annual Movie-Plot Threat Contest Semifinalists
4:53p[info]syn_schneierFriday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid
17th
6:13a[info]syn_schneierBlowback from the NSA Surveillance
12:47p[info]syn_schneierProject C-43: A Final Piece of Public-Key Cryptography History
18th
5:57a[info]syn_schneierEvidence that the NSA Is Storing Voice Content, Not Just Metadata
11:02a[info]syn_schneierNSA Secrecy and Personal Privacy
4:00p[info]syn_schneierDetails of NSA Data Requests from US Corporations
19th
6:24a[info]syn_schneierCost/Benefit Questions NSA Surveillance
11:19a[info]syn_schneierFinding Sociopaths on Facebook
2:18p[info]syn_schneierPetition the NSA to Subject its Surveillance Program to Public Comment
20th
6:04a[info]syn_schneierThe US Uses Vulnerability Data for Offensive Purposes
12:19p[info]syn_schneierLove Letter to an NSA Agent
2:42p[info]syn_schneierNew Details on Skype Eavesdropping
21st
6:25a[info]syn_schneierThe Japanese Response to Terrorism
11:43a[info]syn_schneierUS Offensive Cyberwar Policy
2:32p[info]syn_schneierMe on the Lou Dobbs Show
4:28p[info]syn_schneierFriday Squid Blogging: How the Acidification of the Oceans Affects Squid
24th
5:31a[info]syn_schneierThe Future of Satellite Surveillance
1:38p[info]syn_schneierSpear Phishing Attack Against the Financial Times
25th
6:24a[info]syn_schneierMAD in Cyberspace
26th
7:02a[info]syn_schneierCracking the Kryptos Sculpture
12:35p[info]syn_schneierSecrecy and Privacy
27th
6:34a[info]syn_schneierLessons from Biological Security
11:49a[info]syn_schneierPre-9/11 NSA Thinking
28th
5:31a[info]syn_schneierMalware that Foils Two-Factor Authentication
1:37p[info]syn_schneierPreventing Cell Phone Theft through Benefit Denial
2:42p[info]syn_schneierMy Talk at Google
2:44p[info]syn_schneierMe on EconTalk
4:07p[info]syn_schneierFriday Squid Blogging: Man Pulled Under by Squids