Wonderful! Thank you a lot!
Nov 12, 2020, 12:29 PM
Wonderful! Thank you a lot!
My interview with Sonya Moisset
Oct 19, 2020, 6:27 AM
Sonya Moisset has this cool project “Epic Women in Cyber”, where she shares stories about women who work in cybersecurity.When I was reading some of these stories, I was amazed by how different and extraordinary these women are. They live...
Thank you a lot! I’ve updated the name and the link.
Feb 5, 2020, 6:40 AM
Thank you a lot! I’ve updated the name and the link.
Popular note-taking apps share these security flaws: security tips for developers
Feb 15, 2019, 6:25 AM
This is a very short review of security flaws I found when searching for a note-taking app I’d like to use. I decided to publish some of my findings with security improvement suggestions (because security is complicated). These tips might...
дополнительно я бы добавила:
Dec 21, 2018, 7:54 PM
дополнительно я бы добавила:revocation доступа к базам, аккаунтам клиентов, тестовым аккаунтам у приложений/баз/рабочих систем (сменить все пароли у шаренных аккаунтов, к которым был доступ)удаление из слакаудаление доступа к почте (мне...
I am sis ;)
Dec 4, 2018, 9:15 AM
I am sis ;)
Thank you for suggestion!
Aug 21, 2018, 7:59 AM
Thank you for suggestion!Haven’t watched them yet, but will do and maybe add to list at some point.
How to start learning cryptography
May 19, 2018, 5:04 AM
—this is what people ask me often 😊Below you’ll find my typical reply, that I’ll keep updating when changing my mind.Listen to cosmic Prof. Felix!📕 I can really recommend a Serious Cryptography book. It’s awesome, easy-to-understand and...
Zero Knowledge Architectures for Mobile Applications
Dec 28, 2017, 9:18 AM
This is a small handout doc following my talk “Zero Knowledge Architecture for mobile applications”, which I gave at several conferences during the autumn of 2017.Sensitive data narrativeIf you want to hear the story about sensitive data...
Key Management Approaches for Mobile apps
Jun 4, 2017, 7:46 PM
Some of you know, and some of you don’t, but we all fail at building secure mobile apps.Today we going to talk about key management. We start our journey step by step: discovering infrastructure layout, digging into ideas of threats,...
You’re right.
May 15, 2016, 7:30 PM
You’re right. But if you want to feel more secure, you should use burner phone, f.e. Nokia 3110, with daily rotated SIM card =)Everything less is a compromise.. However, usually keeping the regular sanity, like having PIN, enabling...
Upgrading Approaches to the Secure Mobile Architectures
May 14, 2016, 8:17 AM
That’s the follow-up to the talk I first gave at #appbuilders16 conference in Zurich, Switzerland.We’ll talk a bit about the most undervalued part of mobile security: ideas and concepts. Another name for this talk could be “Everything Will...