Gesamtlänge aller Episoden: 1 day 15 hours 20 minutes
In this issue: On the Twitter Hack Survey of Supply Chain Attacks from the by read by
In this issue: Eavesdropping on Sound Using Variations in Light Bulbs Zoom Will Be End-to-End Encrypted for All Users COVID-19 Risks of Flying iPhone Apps Stealing Clipboard Data Securing the International IoT Supply Chain The Security Value of...
In this issue: Bart Gellman on Snowden Zoom's Commitment to User Security Depends on Whether you Pay It or Not from the by read by
In this issue: Automatic Instacart Bots Securing Internet Videoconferencing Apps: Zoom and Others Me on COVID-19 Contact Tracing Apps from the by read by
In this issue: Work-from-Home Security Advice Emergency Surveillance During COVID-19 Crisis Security and Privacy Implications of Zoom Contact Tracing COVID-19 Infections via Smartphone Apps Ransomware Now Leaking Stolen Documents from the by read by
In this issue: Policy vs. Technology Inrupt, Tim Berners-Lee's Solid, and Me Security of Health Information from the by read by
In this issue: Critical Windows Vulnerability Discovered by NSA Modern Mass Surveillance: Identify, Correlate, Discriminate from the by read by
In this issue: Artificial Personas and Public Discourse 5G Security from the by read by
In this issue: Reforming CDA 230 Scaring People into Supporting Backdoors from the by read by
In this issue: Calculating the Benefits of the Advanced Encryption Standard Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors Technology and Policymakers from the by read by