Syndicated Blog

Cryptosmith
Security architecture, not bitcoins

SCI//HCS-P/SI/TK at Mar-a-Lago

This is a brief explanation of the weird acronyms on the cover sheets that appeared in the photo of classified the FBI seized at Trump’s Mar-a-Lago home. They identify different types of ...

The Mar-a-Lago Mess

I’ve avoided commenting on the FBI’s discovery of classified documents at the Mar-a-Lago Club, the home of former President Donald Trump, before this. Numerous pundits have shared their opinions about Trump’s legal ...

The Quantum Computer Bogeyman

| | Crypto, quantum, security
Peter Gutmann of the University of Aukland recently published a parable “On the Heffalump Threat.” He pokes fun at the R&D cottage industry trying to achieve a practical quantum computer and at ...
Can I auto-post to Mastodon?

Can I auto-post to Mastodon?

| | mastodon, Publishing
I’m reposting this article as part of my tests of auto-posting. In other words, my first attempt wasn’t exactly a success. It appears that I didn’t get my cron working correctly. Like ...
Mastodon

Mastodon

| | mastodon, Publishing
Like lots of other people, I’m looking at Mastodon as a newer, better tech-social community. I’m trying to auto-post from this site to a Mastodon ID, and I have a separate Mastodon ...
Writing Nonfiction with ADHD

Writing Nonfiction with ADHD

| | ADHD, Publishing, training
This post is inspired by Tessa Flattum’s post, “How to Write a Novel with ADHD.” I self-diagnosed my own ADHD after my son was diagnosed as a child. I’ve written three technical ...
Telepathic Declassification

Telepathic Declassification

| | classified, security, Trump
Former President Trump recently suggested that the sitting President simply needs to “think” something is declassified in order to declassify it. Is there a cascade of increasingly formal ways to declassify? Perhaps: ...
Email Attack via a Recycled Domain

Email Attack via a Recycled Domain

A software engineering friend fell victim to an almost-successful attack on his Facebook account. The attacker seemed to have a database of email addresses and user physical locations (i.e. cities, states, small ...
Coursera Course 1

Cybersecurity for MSSE 2023

MSSE second-year students may request a cybersecurity elective as course SENG 5271. If the course is not chosen to be an offered elective, students may take it as an independent study. In ...
Update: Tweeting Top Secret

Update: Tweeting Top Secret

| | classified, security, Top Secret, Trump
Back in the dark ages of the Trump presidency, the President tweeted this photograph. An earlier post examines the legality of this act (100% legal), and speculates about the potential damage to ...