I had previously been (woefully) unaware of the opportunities for abusing various naming systems| Alice, Eve and Bob - a security blog
The first thing to know about blockchain smart contracts is they’re not contracts, smart or necessarily on a blockchain.| Alice, Eve and Bob - a security blog
There is a view that because Open Source Software is subject to review by many eyes, all the bugs will be ironed out of it. This is a myth.| Alice, Eve and Bob - a security blog
Technologies, when combined, sometimes yield fascinating – and commercially exciting – results.| Alice, Eve and Bob - a security blog
Long-time Open Source and Linux bod, distributed systems security, etc.. Founder of P2P Consulting. マイク・バーゼル: オープンソースとLinuxに長く従事。他にも分散セキュリティシステムなども手がける。…| Alice, Eve and Bob - a security blog
Just six months ago, I started a YouTube channel, What is cybersecurity?, to provide short videos (most are under 4 minutes and all are currently well under 10 minutes) discussing topics and issues…| Alice, Eve and Bob - a security blog
” Thank you, I have a test tomorrow and you helped clear things up!”| Alice, Eve and Bob - a security blog
TL;DR: subscribe to my channel What is cybersecurity? I’ve been a little quiet here recently, and that’s a result of a number of events coinciding, including a fair amount of travel (he…| Alice, Eve and Bob - a security blog
This is not just an issue for the UK: if our government gets away with it, so will others.| Alice, Eve and Bob – a security blog
Having a budget assigned and time set aside for patent creation and filing should be an important part of your company strategy.| Alice, Eve and Bob - a security blog
What does an Executive Director do?| Alice, Eve and Bob – a security blog
The more of these you adopt style, the more successful you're going to be (at not being a good boss).| Alice, Eve and Bob – a security blog
A consulting practice reflecting the expertise and experience I've built up over the past 25+ years in the industry.| Alice, Eve and Bob – a security blog