October, 2013 - syn_schneier

Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Month View
Here are the subjects of all posts in the [info]syn_schneier journal in October, 2013.


1st
9:09a[info]syn_schneierWhoIs Privacy and Proxy Service Abuse
10:50a[info]syn_schneierWill Keccak = SHA-3?
1:08p[info]syn_schneierNSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody
2nd
6:46a[info]syn_schneierMy TEDx Talk
1:28p[info]syn_schneierOn Secrecy
3rd
6:43a[info]syn_schneierOn Anonymous
12:55p[info]syn_schneierIs Cybersecurity a Profession?
4th
6:59a[info]syn_schneierDevelopments in Microphone Technology
2:09p[info]syn_schneier"Trust the Math"
4:17p[info]syn_schneierFriday Squid Blogging: Squid Exhibit at the Monterey Bay Aquarium
7th
6:24a[info]syn_schneierHow the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
1:35p[info]syn_schneierSilk Road Author Arrested Due to Bad Operational Security
8th
6:44a[info]syn_schneierWhy It's Important to Publish the NSA Programs
1:05p[info]syn_schneierMe on Surveillance
9th
6:28a[info]syn_schneierThe NSA's New Risk Analysis
1:08p[info]syn_schneierA New Postal Privacy Product
10th
6:03a[info]syn_schneierBreaking Taiwan's Digital ID
11:52a[info]syn_schneierBuild Your Own Enigma
11th
6:45a[info]syn_schneierAir Gaps
12:33p[info]syn_schneierNew Low in Election Fraud
2:53p[info]syn_schneierStuff I Say
4:09p[info]syn_schneierFriday Squid Blogging: 30-Foot Giant Squid Washes Ashore
14th
6:37a[info]syn_schneierFingerprinting Burner Phones
1:06p[info]syn_schneierInsecurities in the Linux /dev/random
15th
6:27a[info]syn_schneierMassive MIMO Cryptosystem
12:37p[info]syn_schneierNew Secure Smart Phone App
1:37p[info]syn_schneierNSA Harvesting Contact Lists
16th
7:33a[info]syn_schneieriPhone Sensor Surveillance
17th
7:15a[info]syn_schneierSecureDrop
12:50p[info]syn_schneier"A Court Order Is an Insider Attack"
18th
6:37a[info]syn_schneierIdentifying Cell Phones Through Sensor Imperfections
12:03p[info]syn_schneierD-Link Router Backdoor
4:10p[info]syn_schneierFriday Squid Blogging: Fiona Apple Wears a Squid as a Hat in New Video
21st
6:05a[info]syn_schneierThe Trajectories of Government and Corporate Surveillance
22nd
6:15a[info]syn_schneierDefending Against Crypto Backdoors
11:32a[info]syn_schneierCan I Be Trusted?
23rd
5:35a[info]syn_schneierDry Ice Bombs at LAX
10:03a[info]syn_schneierCode Names for NSA Exploit Tools
24th
8:45a[info]syn_schneierDARPA Contest for Fully Automated Network Defense
25th
6:30a[info]syn_schneierCognitive Biases About Violence as a Negotiating Tactic
9:26a[info]syn_schneierBook Review: Cyber War Will Not Take Place
9:08p[info]syn_schneierFriday Squid Blogging: Dynamic Biophotonics in Squid
26th
5:43p[info]syn_schneierUS Government Monitoring Public Internet in Real Time
28th
6:39a[info]syn_schneierUnderstanding the Threats in Cyberspace
29th
5:54a[info]syn_schneierArguing for NSA-Level Internet Surveillance
1:46p[info]syn_schneierWhat the NSA Can and Cannot Do
30th
6:50a[info]syn_schneierThe Battle for Power on the Internet
31st
10:29a[info]syn_schneierNSA Eavesdropping on Google and Yahoo Networks