Skip to main content

The WiKID Blog

Viewing posts by admin

trusted-computing-for-mobile-devices

There is a new specification for mobile phone security called the Mobile Security Specification. It is essentially trusted computing for cell phones.

The specification has been years in development, said Janne Uusilehto, head of Nokia product security and the chairman of the working group developing this technology. "It is a big deal. This is the first time that we have created such common security specifications for all handheld devices," Uusilehto said.
More:
When these devices appear, they will make things more difficult for data thieves and mobile virus writers. Down the line, the technology could be used to build electronic wallets into mobile phones. In general terms, the specification calls on hardware vendors to store protected information in a secure area of the phones. Similar to the Trusted Platform Module used in PCs, this technology could be used to ensure that the phone's operating system, applications and data have not been tampered with.

All the usual trusted computing warnings apply here, but perhaps more so as cell carriers maintain a 'walled garden' and can limit the devices available. They are also essentially 'tri-opolies'. It seems likely that you will be able to buy a computer without TCP in the future. You might not be able to buy a cell phone without it (that works on a carrier).

when-the-cone-of-silence-isnt

MSNBC has the a story:

MOSCOW - Intentionally or not, the Russians fed out audio of Thursday’s closed lunch meeting between Secretary of State Condoleezza Rice and Russian Foreign Minister Sergey Lavrov, revealing a fractious exchange over the wording of an official Group of Eight statement on Iraq.

you-might-need-two-factor-authentication

According to this VNUnet article Great North Eastern Railway "inadvertently printed system passwords in a magazine available to thousands of passengers".

is-there-a-cheap-stock-issue-for-google-after-the

I'm no lawyer not a securities expert, but I have sold some companies and one issue we had to deal with when selling to a public company was "cheap stock". The concern is that a company might distribute stock cheaply to insiders before going public, then sell it at a premium. (I guess the regulation protects the existing shareholders?) It is also an issue for employees who get options before an IPO. Options that are granted with the strike price equal to the value of the underlying are not taxed because there is no gain. But if the next day the stock triples because of an IPO, was the valuation correct? Are taxes owed? This regulation makes more sense to me, because Uncle Sam likes his taxes.

top-9-reasons-to-embrace-two-factor-authentication

Passwords have been around forever and it's starting to show. The next level of authentication security is two-factor authentication. Your ATM card is an example of two-factor authentication: you need both possession of the card and knowledge of the PIN to get cash. There are a number of factors that are pushing two-factor authentication toward a tipping point.

Recent Posts

Archive

2024
2022
2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom