Rufo Guerreschi

"Love of True Self and Love of Others Coincide. Love is What We Are"

Skip to content
  • About Me
  • Me on Life
  • Me on the Future
  • Photos
  • Blog (dormant)
  • Contacts & Social

” If attackers located in country A compromise a device that was made in country B, installed in country C, and exfiltrates data to country D, which rules apply?”

February 4, 2015work2Rufo Guerreschi

http://www.darkreading.com/partner-perspectives/intel/the-complicated-relationship-among-security-privacy-and-legislation/a/d-id/1318921

Post navigation

← Schneier late 2013:” Basically, the NSA asks companies to subtly change their products in undetectable ways: making the random number generator less random, leaking the key somehow, adding a common exponent to a public-key exchange protocol, and so on. If the back door is discovered, it’s explained away as a mistake.” Privacy Intl’: ” You do not have to choose between privacy and security….” →

Leave a Reply Cancel reply

You must be logged in to post a comment.

Proudly powered by WordPress