id=10.1371/0177851 Facebook exposed identities of moderators to suspected terrorists https:// Telegram chat app founder claims Feds offered backdoor bribe https:// Five Eyes nations stare menacingly at tech biz and its encryption https:// EU deals Theresa May encryption setback as MEPs propose ban on government backdoors "Member states shall not impose any obligations on electronic communications service providers that would result in the weakening of the security and encryption of their networks and services." Ending The Endless Crypto Debate: Three Things We Should Be Arguing About Instead of Encryption Backdoors https:// When we said don't link to the article, Google, we meant DON'T LINK TO THE ARTICLE!
https:// Finally, a fix for Microsoft’s draconian block on Win7 updates for recent processors https:// Pirate Bay facilitates piracy and can be blocked, top EU court rules https://torrentfreak.com/pirate-bay-facilitates-piracy-and-can-be-blocked-top-eu-court-rules-170614/ • June 16, 2017 PM Using Proven Reference Monitor Patterns for Security Evaluation (2016) This document was interesting for the combo of things in it.
They show legacy systems such as Linux software can be run with full, MLS security.
Then, since it’s also a heavily-biased piece of marketing, they encourage adoption of COTS, high-assurance products such as GEMSOS (which they license) with the last thing saying they have “no conflict of interest.” That was probably a joke by Roger Schell.
These include using Gmail for mobile, the IMAP feature, email forwarding, and so on.
While Gmail’s “last account activity” feature can be helpful, there are also other methods of looking into the safety of your Gmail account and keeping it protected.
Unsurprisingly, Mega Chat is built for folks who have concerns about backdoors being present in popular messaging apps.
Like Mozilla’s new Firefox Hello, Mega Chat is a web-based app — though unlike Hello you do need to create an account in order to use it (as do the people you’re planning to call).
Once you’re signed in, calling is as simple as picking a contact in the conversations pane on the Mega dashboard.
It’s the latest from one of founders of INFOSEC, Roger Schell, who with Paul Karger did landmark evaluations such as MULTICS, helped establish first standards for securing systems (with systems appearing), and with a Burroughs guy convinced Intel to add security features to 286.
The recent work introduces the fundamental concepts (eg reference monitors, TCB subsets) invented in high-assurance security to deal with the effect of complexity on security.