Last year many users of the encrypting software TrueCrypt was asking only one question: TrueCrypt, secure or insecure?
A group of Ten auditors from the Fraunhofer Institute for Secure Information Technology has conducted a six-month audit of TrueCrypt under contract from the German Government. The researchers have expressed a Continue reading →
A commentator on a recent post about the DEA installing license plate scanners on the nation’s interstate highways asks, “If you aren’t doing anything illegal why would you care if someone captures your license plate number?”
Phil Kennedy no longer saw any other way to get the data. That was how one day he came to lie blissfully unconscious on an operating table in Belize while a neurosurgeon sawed off the top of his skull.
The authors of this report are Nader Ammari, Gustaf Björksten, Peter Micek, and Deji Olukotun.
In the age of internet for many users, mobile devices provide the only way of going online. The devices serve as gateways to information, resources, and innovation, but they can also leak intimate details about the Continue reading →