Tourism is Changing the Face of Iceland
https://www.zdziarski.com/blog/?p=7633 [www.zdziarski.com]
2018-11-14 22:32
tags:
business
hoipolloi
travel
With tourism growing 500% in Iceland over the past decade, western tourists have placed higher demands on the country than it’s been capable of adsorbing without affecting the country’s foundations. While the economy in Reykjavik has no doubt experienced a boost, this has come at the expense of cultural and geographical changes that are not necessarily welcome by many Icelanders.
Attacking the Phishing Epidemic
https://www.zdziarski.com/blog/?p=6958 [www.zdziarski.com]
2017-02-17 22:51
tags:
article
auth
browser
defense
malware
security
ux
Comparing Apple Pay with the browser line of death.
Protecting Your Data at a Border Crossing
https://www.zdziarski.com/blog/?p=6918 [www.zdziarski.com]
2017-02-10 14:04
tags:
auth
cloud
life
opsec
policy
security
social
In other words, you don’t need Microsoft to service a warrant, nor will the soil your data sits on matter, because it will be a border agent connecting directly your account with special software.
Also, somewhat older link: https://blog.filippo.io/securing-a-travel-iphone/
Resolving Kernel Symbols in a Post-ASLR macOS World
https://www.zdziarski.com/blog/?p=6901 [www.zdziarski.com]
2017-02-03 15:19
tags:
mac
programming
systems
So most of the kernel is opaque to kernel developers for good reason, and this has reduced the amount of rope they have to hang themselves with. For some doing really advanced work though (especially in security), the kernel can sometimes feel like a Fisher Price steering wheel because of this, and so many have found ways around privatized functions by resolving these symbols and using them anyway.
See also: Slides: Crafting macOS Root Kits
https://www.zdziarski.com/blog/?p=6909
Configuring the Touch Bar for System Lockdown
https://www.zdziarski.com/blog/?p=6705 [www.zdziarski.com]
2017-01-18 02:59
tags:
admin
mac
opsec
security
Plus some useful settings even for people without touch bars.
Backdoor: A Technical Definition
https://www.zdziarski.com/blog/?p=6077 [www.zdziarski.com]
2017-01-13 23:09
tags:
essay
ideas
security
In this paper, I present a three-prong test to determine if a mechanism is a backdoor: “intent”, “consent”, and “access”; all three tests must be satisfied in order for a mechanism to meet the definition of a backdoor. This three-prong test may be applied to software, firmware, and even hardware mechanisms in any computing environment that establish a security boundary, either explicitly or implicitly.
The fact that this goes on for about 20 pages suggests we will not soon see an end to misuse of the term.
Three Recommendations to Harden iOS Against Jailbreaks and Malware
https://www.zdziarski.com/blog/?p=6383 [www.zdziarski.com]
2016-12-23 18:24
tags:
cpu
crypto
defense
hardware
iphone
security
Make better use of the MAC framework and Secure Enclave.