Category Archives: Systems

Apple IOS is an Example of Trustworthy Computing that Started with Microsoft

Anil Dash has written another excellent article that provides a short history of trustworthy computing. It is illuminating because: It explains how Apple’s IOS is an example of a new computing model based on trustworthy computing principles It gives credit to Microsoft research for establishing some of the principles of trustworthy computing. Another theme that…

Who Owns your PC?

This may seem to be obvious but when you really think about it the answer may not be so obvious. You bought the personal computer and presumably installed the software that runs on it but are you really in control of what it is used for? If your PC isn’t secured it can fall prey…

Enterprise vs Personal Security Implementations

This is an example of the difference between an Enterprise and personal security product. Enterprise level products take into account the organizational needs to protect data while personal products rely on a single individual being responsible. With the well known issue of people forgetting their passwords it is asking for trouble providing people with a…

Cards, Agents or Avatars

Infocards is a much needed development for simplifying and unifying the security and privacy interactions that people are starting to have online. Although this is a much needed step and a challenge enough in itself to propagate and refine I can’t help but think that what is ultimately needed is not just a card but…

Apple’s Switch to Intel Could Allow OS X Exploits

Apple’s Switch to Intel Could Allow OS X Exploits Some interesting speculation on the security issues that may arise to challenge the view that Mac systems are more secure.