aboutsummaryrefslogtreecommitdiff
path: root/refer
diff options
context:
space:
mode:
Diffstat (limited to 'refer')
-rw-r--r--refer96
1 files changed, 96 insertions, 0 deletions
diff --git a/refer b/refer
index a9a3638..dd94550 100644
--- a/refer
+++ b/refer
@@ -139,6 +139,10 @@ Accessed 3rd February 2022
%T 110th Congress (2007-2008): FISA Amendments Act of 2008
%D 2008
+%A H.R.3162
+%T 107th Congress (2001-2002): Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001
+%D 2001
+
-- Intel management engine
%T Intel's Management Engine is a security hazard, and users need a way to disable it
@@ -360,3 +364,95 @@ Accessed 5 March 2022
%D April 2018
%A Larry Downes
%J Harvard Business Review
+
+%T Is the Intel Management Engine a backdoor?
+%A Jack Wallen
+%D July 2016
+%J TechRepublic
+%O https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/
+Accessed 25 March 2022
+
+%T Why Windows 11 is forcing everyone to use TPM chips
+%J The Verge
+%A Tom Warren
+%D June 2021
+%O https://www.theverge.com/2021/6/25/22550376/microsoft-windows-11-tpm-chips-requirement-security Accessed 25 March 2022
+
+%T Coming to a laptop near you: A new type of security chip from Microsoft
+%A Dan Goodin
+%D January 2022
+%J Ars Technica
+%O Accessed online 25 March 2022
+%K pluton
+
+%T Pixel 6: Setting a new standard for mobile security
+%A Dave Kleidermacher
+%A Jesse Seed
+%A Brandon Barbello
+%A Stephan Somogyi
+%J Google Security Blog
+%D October 2021
+%O https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html
+Accessed 25 March 2022
+
+%T Why Big Tech should embrace the ‘right to repair’ revolution
+%J Financial Times
+%A Dave Lee
+%D August 2021
+%O Accessed online on 25 March 2022
+
+%T A Notebook You Can Repair
+%J New York Times Wirecutter
+%A Thorin Klosowski
+%D October 2021
+%O https://www.nytimes.com/wirecutter/reviews/framework-laptop/
+Accessed 25 March 2022
+
+%T Post-Quantum Cryptography, Call for Proposals
+%D 2017
+%J National Institute of Standards and Technology Computer Security Resource Center
+%A Lily Chen
+%A Dustin Moody
+%A Yi-Kai Liu
+%O https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/Call-for-Proposals
+Accessed 25 March 2022
+
+%A Alessandro Barenghi
+%A G.M. Bertoni
+%A Emanuele Parrinello
+%A Gerardo Pelosi
+%D September 2009
+%J Conference: Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009
+%T Low Voltage Fault Attacks on the RSA Cryptosystem
+%O DOI: 10.1109/FDTC.2009.30
+
+
+%T Timing Attacks on RSA: Revealing Your Secrets through the Fourth Dimension
+%D n.d.
+%A Wing H. Wong
+%O https://www.cs.sjsu.edu/faculty/stamp/students/article.html
+Accessed 25 March 2022
+
+%T Cache-Timing Attacks on RSA Key Generation
+%D 2019
+%J IACR Transactions on Cryptographic Hardware and Embedded Systems
+%V 2019:4
+%P 213–242
+%O DOI: 10.13154/tches.v2019.i4.213-242
+%A Alejandro Cabrera Aldaya
+%A Cesar Pereida García
+%A Luis Manuel Alvarez
+%A Billy Bob Brumley
+
+%A Tim Cook
+%D February 2016
+%O https://www.apple.com/customer-letter/
+Accessed 25 March 2022
+
+%T Inside the FBI's encryption battle with Apple
+%A Danny Yadron
+%A Spencer Ackerman
+%A Sam Thielman
+%J The Guardian
+%O Accessed online on 25 March 2022
+%D Feb 2016