diff options
| author | root <root@turin.home> | 2022-01-25 19:21:41 +0000 |
|---|---|---|
| committer | root <root@turin.home> | 2022-01-25 19:21:41 +0000 |
| commit | f99481ad484caa2bc34ec101c0baa8845f6dcb16 (patch) | |
| tree | 1270d587ddfaba3912ebfa179dc74ae2bb6c935e /refer | |
| parent | 4d26a0fa4bccbb322683670b8d56af1fc9a60e65 (diff) | |
Writing, read Graham in Sentinel
Diffstat (limited to 'refer')
| -rw-r--r-- | refer | 21 |
1 files changed, 21 insertions, 0 deletions
@@ -37,3 +37,24 @@ %D 2018 %J The Guardian %O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown + +%T Intel's Management Engine is a security hazard, and users need a way to disable it +%A Erica Portnoy +%A Peter Eckersley +%D May 2017 +%J Electronic Frontier Foundation +%O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022) + +%T Facebookâs push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles +%J The Conversation +%A Roberto Musotto +%A David S. Wall +%D December 2019 +%O https://theconversation.com/facebooks-push-for-end-to-end-encryption-is-good-news-for-user-privacy-as-well-as-terrorists-and-paedophiles-128782 (Accessed 22 January 2022) + +%T How Terrorists Use Encryption +%V Volume 9, Issue 6 +%A Robert Graham +%D June 2016 +%J CTC Sentinel +%O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022) |
