Search for: "Steven Bellovin" Results 21 - 40 of 50
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
7 Sep 2016, 8:06 am by Michael A. Specter
For those interested in additional technical details of Apple’s scheme, both Matt Green and Steven Bellovin have helpful write-ups, and Apple’s Blackhat presentation slides, video, and iOS 9 Security Guide (particularly pages 46-47) are available as well. [read post]
27 Oct 2018, 5:53 am by Anushka Limaye
Steven Bellovin and Susan Landau discussed encryption by default in light of new intelligence reports of Chinese and Russian eavesdropping on President Trump’s phone calls. [read post]
29 Aug 2007, 10:04 pm
It's a "comprehensive wiretap system that intercepts wire-line phones, cellular phones, SMS and push-to-talk systems," says Steven Bellovin, a Columbia University computer science professor and longtime surveillance expert. [read post]
23 Jul 2007, 4:08 am
   More coverage here.The NY Times article quotes Steven M. [read post]
3 Dec 2013, 12:37 pm by Sean Gallagher
Bellovin, a computer science professor at Columbia University who teaches security architecture. [read post]
3 Jun 2014, 2:08 pm
Bellovin concludes that these papers indicate that an unreasonable search probably occurs by around seven days. [read post]
26 Sep 2014, 12:00 am by Cindy Cohn
Computer security expert Steven Bellovin has explained some of the problems. [read post]
26 Sep 2014, 2:40 pm by Cindy Cohn
Computer security expert Steven Bellovin has explained some of the problems. [read post]
6 Sep 2010, 11:58 am by Danielle Citron
To consider these and other issues, we have invited an all-star cast of thinkers: Steven Bellovin M. [read post]
12 Feb 2022, 10:06 am by Katherine Pompilio
Bellovin, Adam Shostack and Tarah Wheeler discussed ten questions they hope the Cyber Safety Review board answers and three they think it should ignore. [read post]
7 Jul 2013, 1:56 pm by Robert Chesney
(formerly District Court and Foreign Intelligence Surveillance Court) Kenneth Wainstein (formerly DOJ National Security Division/White House Homeland Security Advisor) 11:30 – 12:30     Lunch Break (on your own) 12:30 – 2:00       Panel II: Role of Technology      Facilitators: James Dempsey and David Medine, Board Members      Panel Members: Steven Bellovin (Columbia… [read post]
1 Feb 2016, 4:00 am by Jonathan Zittrain
For one intriguing attempt to reconcile government use of technological hacking tools with appropriate privacy protections, you might read the proposal for “lawful hacking” that civil liberties-minded computer scientists Steven Bellovin, Matt Blaze, Sandy Clark, and fellow project participant Susan Landau have advocated. [read post]
7 Jul 2015, 10:32 am
Cryptography with a back door adds a third party to the secure communications channel, requiring a more complex protocol, and as computer security expert Steven Bellovin puts it: "Many previous attempts to add such features have resulted in new, easily exploited security flaws rather than better law enforcement access. [read post]
6 Feb 2008, 1:50 pm
Take Columbia University Professor Steven Bellovin, a computer security and networking expert, for one: As a security guy, I'm paranoid, but I don't understand the threat model here. [read post]
6 Jan 2016, 12:14 pm by Benjamin Wittes
An important 2014 paper by Steven Bellovin, Matt Blaze, Sandy Clark and Susan Landau entitled “Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet” described the matter as follows: “Instead of building wiretapping capabilities into communications infrastructure and applications, government wiretappers can behave like the bad guys. [read post]