Pages: 1 3 5 ...6 ...7 8 9 10 11 12 ... 17

  2020-04-15

Book review: "Permanent Record"

  By Hagai Bar-El   , 427 words
Categories: Sources

The book “Permanent Record” is best known for its author, Edward Snowden, the whistleblower who released enormous amounts of secret NSA documents to the press, alleging that the intelligence community in the US violates the rights of citizens for privacy by implementing wide-reaching programs of wholesale surveillance. This is the second book I review that discusses Ed Snowden and his revelations; the previous book I reviewed was “No Place to Hide” by journalist Glenn Greenwald.

Read more »

  2020-03-05

Useful threat modelling

  By Hagai Bar-El   , 1633 words
Categories: Security Engineering, Cyber Security, Management

Do you know what all security documents have in common? — they all were at some time called “threat model"… A joke indeed, and not the funniest one, but here to make a point. There is no one approach to threat modelling, and not even a single definition of what a threat model really is. So what is it? It is most often considered to be a document that introduces the security needs of a system, using any one of dozens of possible approaches. Whatever the modelling approach is, the threat model really has just one strong requirement: it needs to be useful for whatever purpose it is made to serve. Let us try to describe what we often try to get from a threat model, and how to achieve it.

Read more »

  2020-02-22

What will artists do when AI makes art? ...Same as security architects

  By Hagai Bar-El   , 1024 words
Categories: Security Analysis, Counter-media

Computers today already know how to draw great paintings using artificial-intelligence (AI) algorithms, after analyzing many real-human paintings. A sales house just sold one machine-generated portrait painting for $540,000, and by now there are startups that produce AI-generated portraits for $40 a piece. On the musical front, there already are algorithms that, after analyzing compositions made by Bach, compose “Bach” symphonies that even avid listeners cannot tell apart from the real thing. This brings up the question of what’s in the future for artists, now that machines create art that is indistinguishable from that produced by humans.

The same question (at a lower scale) has also been asked about security professionals. Now that machine learning algorithms can tell good from bad when looking at any type of event data, what would human security analysts be left to do? Traditionally, machines used to only sort through records using rules that humans wrote for them, but as it seems, machines are constantly getting better at writing those rules for themselves as well.

So should both worry for their jobs? It is my stance that not at all, and for surprisingly similar reasons.

Read more »

  2019-12-31

Time to reclaim the Internet

  By Hagai Bar-El   , 2015 words
Categories: Security Engineering, Security Policies

We grow increasingly reliant on quite a few Internet-based services: social networks, messaging, photo sharing, and the rest. The challenges we face with privacy, data ownership enforcement, surveillance, and other aspects of digital abuse could all be substantially reduced if those data sharing needs were addressed by the Internet as it was originally architected: decentralized and open. We have waited very long, and so remediation would take more than just new standards, but it is doable.

Read more »

  2019-09-07

On protecting yourself against MITM in SSH

  By Hagai Bar-El   , 1081 words
Categories: IT Security, Day-to-Day Security Advice

SSH is one of the best security protocols out there. It is used by anyone remotely logging into servers, as well as for secure connection to Git servers, and for secure file transfers via SFTP. One of the key promises of SSH is protection against active man-in-the-middle attacks. This makes SSH the best choice when connecting to a server over a hostile network, such as over a public hotspot. However, some SSH clients (particularly on mobile phones) void this protection by not caching server keys. Can you do anything about it? Yes, use private-keys instead of passwords for client authentication. Read more (also) for the technical details.

Read more »

  2019-08-31

Using Tor to protect against certificate injection by Hotspots

  By Hagai Bar-El   , 667 words
Categories: IT Security, Day-to-Day Security Advice

Tor is typically used to attain anonymity and preserve privacy online. This is by far the most common and appealing use for it. Most people without such concerns are not likely to ever install a Tor browser on their workstations, and it’s a pity; Tor has at least one additional use-case which is applicable to a much larger audience. This use-case is the prevention of certificate injection when using untrusted network connections.

Read more »

  2019-07-28

Book review: "Data and Goliath"

  By Hagai Bar-El   , 413 words
Categories: Sources

After sitting in my reading list for years, I finally got to read “Data and Goliath” by Bruce Schneier. Overall, this book is as well written as all of Schneier’s books, and is just as scientifically accurate (to the best that I could tell). However, whoever the audience for his book is, they may find it missing essential parts that make it not just a pleasant read, but also a useful one.

Read more »

1 3 5 ...6 ...7 8 9 10 11 12 ... 17


Form is loading...

  XML Feeds

Search

License

All contents are licensed under the Creative Commons Attribution license.