Applied paranoia
About

Posts

  • Sep 16, 2023

    Replacing a DH with a KEM in protocols- how and why

  • May 13, 2023

    Should you encrypt everything?

  • Mar 20, 2022

    Responsible disclosure

  • Dec 29, 2021

    Getting rid of Java - without getting rid of Java code

  • Dec 23, 2021

    Lessons learned from the log4j debacle

  • Sep 21, 2021

    A clever approach to X.509 for IOT

  • Sep 9, 2021

    Transient execution of non-canonical accesses -- too paranoid?

  • Sep 6, 2021

    Contents of the Quebec vaccine passport -- TMI?

  • Aug 16, 2021

    Why update your firmware and software?

  • Aug 6, 2021

    Welcome to Applied Paranoia!

  • Oct 26, 2019

    Authentication of individual users in DNP3 Secure Authentication- TB2019-001, and more

  • Oct 7, 2019

    When RSA dies

  • Mar 23, 2017

    "Police hack PGP server" -- really?

  • Jul 10, 2014

    ICS Security: Current and Future Focus

  • Jul 5, 2014

    Is Open Source software security falling apart?

  • Mar 1, 2014

    What the industry should do with the upcoming Aegis release

  • Jan 5, 2014

    ICS security and regulatory requirements

  • Jan 2, 2014

    The Crain-Sistrunk vulnerabilities

  • Sep 29, 2009

    Security at the Design Phase - Examples & Review

subscribe via RSS

Applied paranoia

  • Applied paranoia
  • rlc@vlinder.ca
  • blytkerchan
  • rlcvlinder

Cybersecurity blog by Ronald Landheer-Cieslak.