Skip to main content

Posts

Showing posts with the label Asymptotic Notation

Featured Post

Spectre and Meltdown Explained, and a Proposed Counter Against Them

On January 15, 2018, 2:58 AM PST, Josh Fruhlinger wrote Spectre and Meltdown explained: What they are, how they work, what’s at risk . As threats, regarding these two risks, Spectre and Meltdown, Fruhlinger wrote, “In the first days of 2018, published research revealed that nearly ever computer chip manufactured in the last 20 years contains fundamental security flaws, with specific variations on those flaws being dubbed Spectre and Meltdown ” (Fruhlinger, Jan 15, 2018). Fruhlinger was stating this: despite the best known efforts Electrical Engineers and Computer Scientists exercised, computer chip technology dated 1998 AD - 2018 AD has experienced an error, design flaws, that led to known defects, Spectre and Meltdown, and these are potentially great failures.  Side-channel technology requires high grade technical research, and this can be because Spectre and Meltdown exist, so a layman would not have known it, 22 years ago. According to Josh Fruhlinger, speculative execution and cac

On Hacking the Axis and Securing History Records

  On Security Requirements, Review Physical Might On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis . When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75 th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect. Emergent Cybersecurity Requirements With physical security, there is an emergent cybersecurity necessity that John

Contact Form

Name

Email *

Message *