China Innovation gif

America wants to believe China can’t innovate. Tech tells a different story.

“The truth is that behind the Great Firewall — the system of censorship designed to block content that could challenge the Chinese Communist Party — China’s tech scene is flourishing in a parallel universe.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 4 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.

Read More
A live visualization of the online phishing and fraudulent phone calls across China. (Ng Han Guan/Associated Press)

China’s vast Internet prison

In law and in practice, China is creating the world’s largest online thought prison. It turns the idea of the Internet as a force for freedom on its head, and as China goes, so go other tyrants. From Vietnam to Saudi Arabia, from Russia to Turkey, the age of Internet repression has blossomed.

Read More
MIT's Time-Sharing Computer

Passwords Evolved: Authentication Guidance for the Modern Era

Here’s the bigger picture of what all this guidance from governments and tech companies alike is recognising: security is increasingly about a composition of controls which when combined, improve the overall security posture of a service. What you’ll see across this post is a collection of recommendations which all help contribute to a more robust solution by virtue of complementing one another.

Read More
Ray Holt - Photograph: William Widmer

The Secret History of the First Microprocessor, the F-14, and Me

This is the story, then, of how another first microprocessor, a secret one, came to be—and of my own entwinement with it. The device was designed by a team at a company called Garrett AiResearch on a subcontract for Grumman, the aircraft manufacturer. It was larger, it was a combination of six chips, and it performed crucial functions for the F-14 Tomcat fighter jet, which celebrates the 50th anniversary of its first flight this week.

Read More
complex traffic signals - Credit: Palm Jumeirah Guides

Securing Internet Applications from Routing Attacks

This article provides a new perspective by showing that routing attacks on Internet applications can have even more devastating consequences for users—including uncovering users (such as political dissidents) trying to communicate anonymously, impersonating websites even if the traffic uses HTTPS, and stealing cryptocurrency. This article argues that the security of Internet applications and the network infrastructure should be considered together, as vulnerabilities in one layer led to broken assumptions (and new vectors for attacks) in the other.

Read More
computers at edge of crator, illustration - Credit: Novikov Aleksey

Cybersecurity: Is It Worse than We Think?

[In this article, we] seek to complement the myriad security research notes by investigating specific cybersecurity practices within organizations to evaluate where organizations are showing improvement, where they are stagnant, and what may be influencing these changes. Our results confirm that cyber-security continues to receive attention on the surface, but when looking beyond surface-level impressions a surprising lack of progress is being made.

Read More