Table of Contents
If you want to send us your comments, please do so. Thanks
More on comments
Computer security
The Censys data base can be useful to investigate security issues
Sans: The 17 Best Cybersecurity Podcasts. Status 2023
Trust in connected devices
When a device is used, which connects to a remote Internet service of unknown repute, the owner of the device is truly placing a huge amount of trust into entities whose trust has not been earned and may not be deserved. It's bad enough to have one's light switches and plugs connected back to potentially hostile foreign soil. But giving remote, and in clearly irresponsible, entities real-time knowledge of vehicle location and movement and even over the vehicle's real-time fuel flow seems reckless at best.1)
Apple Airtags are a risk
Webbrowser security
Javascript
Login
If the password can be reset via e-mail the password safety depends on the safety of the e-mail system. That includes the e-mail provider and all the e-mail servers the e-mail passes through. If the connection is not save it also includes the wires which can be tapped. For important logins it is advised to use two factor authentication like OTP2)
Bit flips
Bit filps, like the ones from cosmic background radiation, can make a connection insecure if the software and hardware are not hardened to it
Main subjects on this wiki: Linux, Debian, HTML, Microcontrollers, Privacy
RSS
Disclaimer
Privacy statement
Bugs statement
Cookies
Copyright © : 2014 - 2024 Webevaluation.nl and the authors
Changes reserved.