Tag Archives: Schneier

Buzzword Compliance at SMPTE/NAB/CinemaCon

There are a couple of concepts in the security world that became took some apparent relavence this last few weeks as engineers from all over got together to share their recent discoveries and show their wares. The first is what is known as Schneier’s Law: 

Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can’t break. It’s not even hard. What is hard is creating an algorithm that no one else can break, even after years of analysis. And the only way to prove that is to subject the algorithm to years of analysis by the best cryptographers around.

Schneier on Security: “Schneier’s Law”

The other principle is discussed on Schneier’s and other security sites and is called Security by Obscurity. In the security world these quickly turn the conversation to the topic of open and closed source software. And this is the subject of the Buzzword Compliance Award for 2013.

[……]

Read more

Buzzword Compliance at SMPTE/NAB/CinemaCon

There are a couple of concepts in the security world that became took some apparent relavence this last few weeks as engineers from all over got together to share their recent discoveries and show their wares. The first is what is known as Schneier’s Law: 

Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can’t break. It’s not even hard. What is hard is creating an algorithm that no one else can break, even after years of analysis. And the only way to prove that is to subject the algorithm to years of analysis by the best cryptographers around.

Schneier on Security: “Schneier’s Law”

The other principle is discussed on Schneier’s and other security sites and is called Security by Obscurity. In the security world these quickly turn the conversation to the topic of open and closed source software. And this is the subject of the Buzzword Compliance Award for 2013.

[……]

Read more

SSL Breaches & Duqu; What is DCinema Interesting

More and more news articles are pointing out more and more compromised systems. The systems are not the computers of us simple folk, but rather computers just like ours that sit behind sophisticated firewalls and have sophisticated staff working to prevent problems.

They use the same words that the DCinema world uses when discussing security: Trusted Devices, digital certificates, revocation of keys, and the like. 

[……]

Read more

Stuxnet and SCADA – New News

Stuxnet is a piece of malware that attacks industrial process computers running a certain set of standardized controls. The troubles that this standard is facing now that there are people paying attention to it is only interesting to us if we consider that eventually “black hats” will turn their attention on Ddcinema systems. But why would anyone want to do that.

Following is an article on Schneier on Security.

[……]

Read more

The Threat of Cyberwar Has Been Grossly Exaggerated

“If, on the other hand, we use the more measured language of cybercrime, we change the debate. Crime fighting requires both resolve and resources, but it’s done within the context of normal life. We willingly give our police extraordinary powers of investigation and arrest, but we temper these powers with a judicial system and legal protections for citizens.”

Thus begins Bruce Schneier’s latest request that we accept some cyber-reality with our cyber-reduction of rights. The following paragraphs begin the article, but you should read the entire piece at:

[……]

Read more