Security: Difference between revisions
Content added Content deleted
No edit summary |
No edit summary |
||
Line 236: | Line 236: | ||
Dingledine, Roger. 2012. [http://www.freehaven.net/~arma/cv.htmlRoger Dingledine's Curriculum]. (If website is blocked, view through Tor/Vidalia enabled browser). Cambridge, MA: www.freehaven.net/~arma/cv.html |
Dingledine, Roger. 2012. [http://www.freehaven.net/~arma/cv.htmlRoger Dingledine's Curriculum]. (If website is blocked, view through Tor/Vidalia enabled browser). Cambridge, MA: www.freehaven.net/~arma/cv.html |
||
Eckersley, Peter. 2014. [https://www.eff.org/files/surveillance-todos.pdf How can we protect the Internet against surveillance? Seven TODO items for users, web developers and protocol engineers]. San Francisco, CA: Electronic Frontier Foundation. |
|||
Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com. |
Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com. |