Posts from the ‘Internet’ Category

- 09.22.21Comments on the Federal Zero Trust Strategy
- 012.1.19Requiring TLS transmission of email
- 01.16.19Another NIST SP 800-63 mirror
- 26.11.18The need for provenance with BYO authenticators
- 13.8.18Passwords: what minimum length?
- 212.5.17Protecting passwords against cracking with rehash
- 08.1.17The gaping hole allowing email spoofing
- 06.20.17Twitter threads: wrong medium
- 011.17.16Facebook is not a news source
- 18.21.16DNSSEC Signing Revisited