Joining the late 20th century
What did it feel like to be the last buggy whip driver on a road crammed with exhaust spewing Fords? A sailmaster staring at the stern of an ironsided steamship? A telegraph operator making his first...
View ArticleWhy .Secure? Part I: Listening to the User
“Security and usability must not be in conflict. If it’s not safe, it’s not usable; if it’s not usable, it can’t be used safely.” – Chris Palmer, circa 2008 If you are one of the dozens of...
View ArticleIntroducing something that might become the Domain Policy Framework
I have already started to lay out why we are going after the .secure TLD, let’s start the discussion of how it would be different. As I have repeated to a dozen reporters in the last 36 hours, there...
View ArticleAnswering Questions about .Secure
The initial tech press coverage of Artemis and .Secure has been very gratifying, although it creates a situation where many people are raising the same questions or concerns. Instead of trying to...
View ArticleThe Truth about Aaron Swartz’s “Crime”
I did not know Aaron Swartz, unless you count having copies of a person’s entire digital life on your forensics server as knowing him. I did once meet his father, an intelligent and dedicated man who...
View ArticleA Taxonomy of PRISM Possibilities
I have been fielding a decent number of calls and emails from reporters on the NSA PRISM scandal. A lot of people are trying to synthesize reasonable technical explanations for how the NSA could...
View ArticleBlack Hat and Defcon Talks
Hello, gentle reader. It has been quite a week for the team at iSEC Partners, NCC Group and Artemis. We have had a total of ten talks at Black Hat and Defcon. While the opportunity to interact with our...
View Article