Search for: "Susan Landau" Results 181 - 200 of 243
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
18 May 2013, 10:58 am by Raffaela Wakeman
Susan Landau wrote in to react to a Times story on expanding CALEA to peer-t0-peer communications. [read post]
29 Sep 2014, 7:00 am by Wells Bennett
Susan Landau is a Professor of Cybersecurity Policy at Worcester Polytechnic Institute. [read post]
11 May 2013, 8:00 am by Raffaela Wakeman
On the heels of the news that policymakers are considering rewriting wiretapping laws, Susan Landau wrote in with her critique of the reported proposal. [read post]
8 Nov 2014, 6:55 am by Benjamin Bissell
Susan Landau advised us on how not to do remote computer searches in light of the FBI’s new hacking plans. [read post]
30 Jun 2014, 6:43 am by Wells Bennett
Susan Landau is a Professor of Cybersecurity Policy at Worcester Polytechnic Institute. [read post]
2 Dec 2010, 10:05 pm by Jeffrey Richardson
Similarly, Adam Satariano and Susan Decker of BusinessWeek write about the patent law battles between Apple and Nokia. [read post]
6 Jan 2016, 12:14 pm by Benjamin Wittes
An important 2014 paper by Steven Bellovin, Matt Blaze, Sandy Clark and Susan Landau entitled “Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet” described the matter as follows: “Instead of building wiretapping capabilities into communications infrastructure and applications, government wiretappers can behave like the bad guys. [read post]
20 Jun 2015, 9:30 am by Staley Smith
"   Susan Landau expressed surprise at Ben’s comments, asserting that privacy groups are right to focus on the intelligence agencies’ overcollection and abuse of intelligence on its own citizens. [read post]
The security-research community has reacted negatively, pointing out flaws in Ozzie’s proposal and generally downplaying the significance of the research described in the National Academies report, emphasizing, as Susan Landau did in April on Lawfare, that the research is preliminary and “more akin to sketches than a system architecture. [read post]
1 Dec 2022, 5:16 am by Stephanie Pell
  As Susan Landau has observed, the interaction between Microsoft and Neuberger “represents an important change in the cooperation between the U.S. government and the tech industry”—the kind of cooperation that may not have seemed possible just a decade ago in the wake of the Edward Snowden disclosures. [read post]
30 Oct 2017, 3:00 am by Garrett Hinck
Wednesday, November 1 at 5:00 pm: The Hoover Institution will host another event in the Security by the Book series on Susan Landau’s new book Listening In: Cybersecurity in an Insecure Age. [read post]
30 Mar 2020, 1:15 pm by Stewart Baker
Rather than argue directly against phone tracking, privacy advocates such as Susan Landau have instead fallen back on a couple of practical objections. [read post]
18 Jul 2015, 7:00 am by Staley Smith
Point, counterpoint---Susan Landau responded to Ben, arguing that the answer to Ben’s second question is already clear: mandating extraordinary access is mandating insecurity. [read post]
16 Sep 2016, 12:12 pm by Rishabh Bhandari
Susan Landau flagged a new research technique that might help the FBI access an Apple iPhone’s data. [read post]
29 Sep 2016, 12:26 pm by Zachary Burdette, Quinta Jurecic
  ICYMI: Yesterday, on Lawfare   Susan Landau discussed exceptional access systems. [read post]
16 Mar 2017, 12:09 pm by Jordan Brunner
Susan Landau wrote that the FBI might just agree with her about security risks and going dark. [read post]
1 Dec 2016, 11:38 am by Susan Hennessey
This morning on Lawfare, Susan Landau asserted that the rule change allowed the FBI “to use a single warrant to hack into victims' machines no matter where they may be. [read post]
3 Oct 2018, 7:07 am by David Stanton, Wenqing Zhao
Susan Landau suggests that the Five Eyes intelligence alliance’s calls for tech companies to assist in decryption may be overblown. [read post]
1 Aug 2015, 7:00 am by Staley Smith
Susan Landau brought us two different perspectives on “going dark,” also known as end-to-end encryption, that were presented at Aspen. [read post]
2 May 2018, 2:21 pm by David Ruiz
Noted crypto expert Susan Landau worried that some might misinterpret the report as providing evidence that an exceptional access system is close to being securely built: "The Academies report does discuss approaches to ‘building ... secure systems’ that provide exceptional access—but these are initial approaches only…The presentations to the Academies committee were brief descriptions of ideas by three smart computer scientists, not detailed… [read post]