skip to main | skip to sidebar
SIPantic

Saturday, December 23, 2017

We all need some of this....

https://www.theverge.com/2017/12/23/16812834/edward-snowden-haven-guardian-project-laptop-phone
Posted by Ken at SIPantic at 5:35 PM No comments: Links to this post
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Friday, December 8, 2017

Trust must always be minimal and subject to scientific proof through lambda-calculus and Church-Turing machinery implemented in hardware. K J HAMER-HODGES....E.G. Rutkowska: Trust Makes Us Vulnerable

https://www.darkreading.com/vulnerabilities---threats/rutkowska-trust-makes-us-vulnerable/d/d-id/1330587


Posted by Ken at SIPantic at 7:52 AM No comments: Links to this post
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Security industry needs to be less trusting to get more secure • The Register Forums

https://forums.theregister.co.uk/forum/1/2017/12/07/security_distrusting/?mt=1512736508789

Minimal trust always comes back to capability based Church-Turing machines that scientifically encapsulate algogithms as proven by the Plessey PP250 decades ago.
Posted by Ken at SIPantic at 7:42 AM No comments: Links to this post
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

My Quick Links

  • Home
  • The Virtualization of Democracy
  • Caja for Safe JavaScript
  • E Concurrency in a Page
  • E RIghts Home Page
  • EIG
  • Florida Dot Net
  • Open Air
  • Google App Testing

Ken Hamer Hodges

Ken Hamer Hodges
On Route 66

About Me

My photo
Ken at SIPantic
Boca Raton, Florida, United States
Independent Consultant in South Florida for all things related to secure cloud based software and new mobile communication software. Graduated in the UK, developed the first Capability Based Computers (PP-250), became a Charted Engineer and awarded a Fellowship of the IEE (London). Partnered on a dozen patents developing Object Engineering fundamentals while working in UK, USA, Germany and Belgium. Invitation speaker at conferences on Operating Systems and Communications.
View my complete profile

Mobility App

ZDNet: How one hacked laptop led to an entire network being compromised

ZDNet: How one hacked laptop led to an entire network being compromised. https://www.zdnet.com/article/how-one-hacked-laptop-led-to-an-entir...

Blog Archive

  • ►  2019 (9)
    • ►  February (9)
  • ►  2018 (111)
    • ►  December (1)
    • ►  November (10)
    • ►  October (2)
    • ►  September (6)
    • ►  August (11)
    • ►  July (14)
    • ►  June (16)
    • ►  May (13)
    • ►  April (6)
    • ►  March (14)
    • ►  February (6)
    • ►  January (12)
  • ▼  2017 (50)
    • ▼  December (3)
      • We all need some of this....
      • Trust must always be minimal and subject to scient...
      • Security industry needs to be less trusting to get...
    • ►  November (3)
    • ►  October (8)
    • ►  September (12)
    • ►  August (6)
    • ►  July (1)
    • ►  June (7)
    • ►  May (9)
    • ►  February (1)
  • ►  2016 (12)
    • ►  December (2)
    • ►  August (1)
    • ►  July (5)
    • ►  May (1)
    • ►  March (2)
    • ►  January (1)
  • ►  2015 (20)
    • ►  November (2)
    • ►  July (4)
    • ►  June (2)
    • ►  May (3)
    • ►  April (2)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2014 (29)
    • ►  December (1)
    • ►  November (3)
    • ►  September (1)
    • ►  August (1)
    • ►  July (2)
    • ►  June (4)
    • ►  May (17)
  • ►  2012 (1)
    • ►  December (1)
  • ►  2008 (15)
    • ►  December (1)
    • ►  October (1)
    • ►  August (2)
    • ►  July (1)
    • ►  June (4)
    • ►  April (3)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2007 (6)
    • ►  January (6)
  • ►  2006 (1)
    • ►  December (1)