I read a lot, and I sometimes struggle to find ways to articulate how useful it…
Archives for September 2017
Why Biometric Data Breaches Won’t Require You To Change Your Body
I hear a lot of people in InfoSec say things like, I guess if my biometrics get…
Format Painter in Apple Pages
I mostly use Microsoft Word for documents because Office is the platform of business,…
With Facebook and Google You Are Literally The Product
A lot of people don’t get the significance of being a product. It doesn’t…
Gender Dysphoria Contradicts Both Conservatives and Liberals
One of my favorite things to observe and study is how reality breaks models, and…
How to Tell If You Should Hire an InfoSec Person With a Music Degree
It’s the only chart you’ll ever need for this. You’re welcome.…
A Rudimentary Threat Model Framework for Password vs. TouchID vs. FaceID
There’s been a lot of discussion around Apple’s replacement of TouchID…
Whitelisting Cloudflare With IPTABLES
Many people use Cloudflare to protect their website but don’t restrict access…
What If Attackers Pivot from Ransom to Extortion?
This is one of those ideas that I debate a bit before posting. Either 1) it’s…
My Thoughts on the iPhone X Announcement
Apple released its iPhone X (ten, not ex) today. I’m a complete Apple acolyte…
I Finally Found a Book Summarization Service
For like the last 10 years I’ve been looking for a solid book summarization…
Authentication Types and Their Impact on Forced Device Access
We’re hearing a lot about what Apple is doing with the new iPhone, specifically…
Facial Gestures and Eye Tracking as Computer Inputs
There’s a lot of talk of voice becoming a major computer interface in the…
Marketing Groups are Junking Up the Security News
It’s getting harder to tell the difference between marketing and security…