Rufo Guerreschi

"Love of True Self and Love of Others Coincide. Love is What We Are"

Skip to content
  • About Me
  • My Understanding of Life and the Universe
  • My Political and Technological Vision
  • Contacts & Social Network Presence
  • Photos

” If attackers located in country A compromise a device that was made in country B, installed in country C, and exfiltrates data to country D, which rules apply?”

February 4, 2015work2Rufo Guerreschi

http://www.darkreading.com/partner-perspectives/intel/the-complicated-relationship-among-security-privacy-and-legislation/a/d-id/1318921

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Like this:

Like Loading...

Post navigation

← Schneier late 2013:” Basically, the NSA asks companies to subtly change their products in undetectable ways: making the random number generator less random, leaking the key somehow, adding a common exponent to a public-key exchange protocol, and so on. If the back door is discovered, it’s explained away as a mistake.” Privacy Intl’: ” You do not have to choose between privacy and security….” →

Leave a Reply Cancel reply

You must be logged in to post a comment.

Proudly powered by WordPress
%d bloggers like this: