A perimeter is always porous, to certain people. Managing how it is perforated is a kind of professional work. Odd behavior is socially marked out and isolated. In the US security industry, by contrast, a similar function is exported to technologies of access control and credentialing. One of the central artefacts that exercises elements of both is the lanyard. Unlike the laminated ID alone, the lanyard presents a constellation of belonging all at once and, unlike the uniform, its lightweight...| Platypus
I have never seen security and privacy checklists used for any other purpose but deception. After pondering this observation, I’m left seriously doubting if comparison checklists have any val…| Dhole Moments
(With severe apologies to Miles Davis.) Post-Quantum Cryptography is coming. But in their haste to make headway on algorithm adoption, standards organizations (NIST, IETF) are making a dumb mistake…| Dhole Moments
I didn’t want to add my voice to the cacophony of hot takes about the xz backdoor incident because I’m sure many people are already sick of hearing about it. However, there is something…| Semantically Secure
I quit my job towards the end of last month. When I started this blog, I told myself, “Don’t talk about work.” Since my employment is in the rear view mirror, I’m going to b…| Dhole Moments