aboutsummaryrefslogtreecommitdiff
path: root/refer
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-01-25 19:21:41 +0000
committerroot <root@turin.home>2022-01-25 19:21:41 +0000
commitf99481ad484caa2bc34ec101c0baa8845f6dcb16 (patch)
tree1270d587ddfaba3912ebfa179dc74ae2bb6c935e /refer
parent4d26a0fa4bccbb322683670b8d56af1fc9a60e65 (diff)
Writing, read Graham in Sentinel
Diffstat (limited to 'refer')
-rw-r--r--refer21
1 files changed, 21 insertions, 0 deletions
diff --git a/refer b/refer
index af7e47b..b949f58 100644
--- a/refer
+++ b/refer
@@ -37,3 +37,24 @@
%D 2018
%J The Guardian
%O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown
+
+%T Intel's Management Engine is a security hazard, and users need a way to disable it
+%A Erica Portnoy
+%A Peter Eckersley
+%D May 2017
+%J Electronic Frontier Foundation
+%O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022)
+
+%T Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles
+%J The Conversation
+%A Roberto Musotto
+%A David S. Wall
+%D December 2019
+%O https://theconversation.com/facebooks-push-for-end-to-end-encryption-is-good-news-for-user-privacy-as-well-as-terrorists-and-paedophiles-128782 (Accessed 22 January 2022)
+
+%T How Terrorists Use Encryption
+%V Volume 9, Issue 6
+%A Robert Graham
+%D June 2016
+%J CTC Sentinel
+%O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022)