skip to main | skip to sidebar

No Tricks

Risk, Security, Math, Crypto

Favourite Posts

Below is a collection of posts that I enjoyed researching and writing, listed in no particular order
  1. A Risk Anaylsis of Risk Analysis
  2. The Risk of Degradation to GPS
  3. Moore's Law and Attention Crash
  4. NIST, Passwords and Entropy
  5. The Sub-time Crisis in Web 2.0
  6. The Wisdom of a random crowd of One
  7. Zero Knowledge Proofs
  8. AES-256 and Reputational Risk
  9. Goodbye Yellow Brick Road 
  10. The Internet Repetition Code
    You can find FreeMind maps for some of these posts here.
    Bookmark and Share
    Home
    Subscribe to: Posts (Atom)

    About Me

    Unknown
    View my complete profile

    Quick Links

    • Home
    • Luke O'Connor Bio
    • Top Posts
    • Favourite Posts
    • Scribd Collections
    • The No Tricks Name

    Subscribe

    Posts
    Atom
    Posts
    All Comments
    Atom
    All Comments

    ALL POSTS

    • on AES and A5/1
    • on Passwords
    • on the Birthday Paradox
    • on Entropy
    • with FreeMind outlines

    Search This Blog

    Blog Archive

    • ▼  2013 (3)
      • ▼  April (2)
        • Some Mindmaps Online
        • The 12 Bonk Rule
      • ►  February (1)
    • ►  2012 (2)
      • ►  May (2)
    • ►  2011 (32)
      • ►  October (4)
      • ►  September (13)
      • ►  August (5)
      • ►  June (2)
      • ►  May (1)
      • ►  April (2)
      • ►  March (4)
      • ►  January (1)
    • ►  2010 (116)
      • ►  December (7)
      • ►  October (1)
      • ►  September (7)
      • ►  August (14)
      • ►  June (1)
      • ►  May (38)
      • ►  April (7)
      • ►  March (15)
      • ►  February (24)
      • ►  January (2)
    • ►  2009 (111)
      • ►  December (9)
      • ►  November (26)
      • ►  October (3)
      • ►  September (6)
      • ►  August (3)
      • ►  July (3)
      • ►  June (13)
      • ►  May (9)
      • ►  April (11)
      • ►  March (9)
      • ►  February (5)
      • ►  January (14)
    • ►  2008 (25)
      • ►  December (7)
      • ►  November (3)
      • ►  October (2)
      • ►  August (3)
      • ►  July (3)
      • ►  June (3)
      • ►  May (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2007 (2)
      • ►  October (1)
      • ►  September (1)

    Lijit Search

    Lijit Search

    Labels

    • A5/1 (7)
    • AES (9)
    • Analysis (3)
    • Anonymity (7)
    • AV (4)
    • Awareness (3)
    • Biometric (2)
    • Birthday Paradox (5)
    • Black Swan (11)
    • Block Cipher (1)
    • Blogging (15)
    • Books (5)
    • Border Search (1)
    • BP (1)
    • Browser (4)
    • Bruce (3)
    • Brute Force (2)
    • Buffer Overflow (1)
    • Business Insider (1)
    • business models (1)
    • CAPTCHA (2)
    • Certificates (1)
    • Charting (2)
    • Choice (1)
    • Chrome (1)
    • CISO (1)
    • cloud computing (11)
    • coincidences (2)
    • Cold Boot (2)
    • Conficker (4)
    • controls (1)
    • Course (2)
    • cryptography (10)
    • Data (5)
    • Data Breach (4)
    • Data Center (1)
    • Data Centric Security (4)
    • DDoS (1)
    • DES (1)
    • DNS (3)
    • DoD (1)
    • education (2)
    • Elliptic Curves (1)
    • Email (2)
    • Encrypted search (4)
    • Encryption (14)
    • ENISA (3)
    • Entropy (7)
    • Estimation (1)
    • Excel (2)
    • Facebook (4)
    • Factoring (3)
    • faraday (2)
    • Fault Injection (2)
    • Fibonnaci (1)
    • FireFox (1)
    • framework (1)
    • FreeMind (6)
    • FSA (1)
    • FUD (2)
    • Gambling (1)
    • games (1)
    • Google (6)
    • GPS (3)
    • GPU (1)
    • Green IT (1)
    • GSM (3)
    • Half Life (2)
    • Hashing (2)
    • HP (1)
    • Humour (6)
    • IBM (6)
    • ICANN (2)
    • IE (2)
    • IEEE (1)
    • IEP (2)
    • Infographic (3)
    • Interesting (4)
    • iPad (1)
    • iPhone (1)
    • ISACA (2)
    • IT (1)
    • IT Risk (3)
    • Key Lengths (3)
    • Key Management (1)
    • Koobface (1)
    • Language (1)
    • Long Tail (3)
    • Lottery (1)
    • Malware (4)
    • Metrics (1)
    • microsoft (5)
    • Mind mapping (6)
    • Natural Catastrophe (2)
    • New School of Information Security (1)
    • NIST (3)
    • NodeXL (1)
    • NSA (1)
    • One Way Hash Arguments (1)
    • Online transactions (1)
    • Open Source (2)
    • OWASP (3)
    • P2P (1)
    • PageRank (3)
    • Passwords (28)
    • phishing (1)
    • PKI (2)
    • policy (1)
    • Power Laws (4)
    • PowerPoint (2)
    • Predictions (2)
    • Presentation (6)
    • Prezi (1)
    • Privacy (5)
    • Probability (4)
    • Project Risk (1)
    • Quantitative (2)
    • Quantum Computing (2)
    • quantum cryptography (1)
    • R Programming Language (1)
    • Rainbow Tables (4)
    • Random Graph Theory (1)
    • Randomness (5)
    • RC4 (2)
    • re-keying (1)
    • Redundancy (1)
    • renegotiation attack (3)
    • Reputational Damage (1)
    • Research (1)
    • Retrospective (6)
    • RFID (2)
    • Risk Factors (6)
    • Risk Management (20)
    • roundup (3)
    • RSA (5)
    • Satellites (2)
    • Scenario Driven Risk Analysis (1)
    • scribd (20)
    • SDL (2)
    • Security (38)
    • Security Management (1)
    • Skype (1)
    • Social Engineering (1)
    • Social Media (3)
    • SOX (1)
    • Spam (2)
    • Spreadsheet (1)
    • SSD (1)
    • ssl (8)
    • Star Wars (2)
    • statistical tests (1)
    • Statistics (2)
    • SUN (1)
    • TED (1)
    • Threat Modeling (4)
    • Tipping Point (1)
    • TLS (3)
    • TMTO (2)
    • ToR (2)
    • Trends (2)
    • trojan (1)
    • Turing (1)
    • Twitter (7)
    • uncertainty (1)
    • USB (7)
    • VaR (1)
    • VeriSign (1)
    • Video (1)
    • Visualization (21)
    • Vulnerabilities (2)
    • Weapons of Math Instruction (1)
    • web 2.0 (9)
    • Whit Diffie (2)
    • Whitelisting (3)
    • whitepaper (2)
    • Wikileaks (1)
    • Windows (1)
    • Wireless (2)
    • Wisdom of Crowds (2)
    • Worm (1)
    • WPA (1)
    • X509 (1)
    • YouTube (1)
    • Zero Knowledge Proof (1)
     

    Apture