"Scientists have developed a technique to sabotage the cryptographic
capabilities included in Intel's Ivy Bridge line of microprocessors. The
technique works without being detected by built-in tests or physical
inspection of the chip." -

http://arstechnica.com/security/2013/09/researchers-can-slip-an-undetectable-trojan-into-intels-ivy-bridge-cpus/


"The Unbelievable Pressure Artists Are Under to Just Completely Make
Some Stuff Up" -

https://careersuicideblog.wordpress.com/2013/09/18/the-lies-of-the-artists/


Do read the NSA worker's piece as well as Gilmore's response -

http://boingboing.net/2013/09/18/john-gilmore-explains-why-spyi.html


China criminalizes viral rumours -

http://disinfo.com/2013/09/china-criminalizes-spreading-false-rumors-online-that-go-viral/


The Journal Of Virtual Worlds Research looks at legal and governance
issues -

http://journals.tdl.org/jvwr/index.php/jvwr
_______________________________________________
NetBehaviour mailing list
[email protected]
http://www.netbehaviour.org/mailman/listinfo/netbehaviour

Reply via email to