Security: Difference between revisions

Content added Content deleted
No edit summary
No edit summary
Line 236: Line 236:


Dingledine, Roger. 2012. [http://www.freehaven.net/~arma/cv.htmlRoger Dingledine's Curriculum]. (If website is blocked, view through Tor/Vidalia enabled browser). Cambridge, MA: www.freehaven.net/~arma/cv.html
Dingledine, Roger. 2012. [http://www.freehaven.net/~arma/cv.htmlRoger Dingledine's Curriculum]. (If website is blocked, view through Tor/Vidalia enabled browser). Cambridge, MA: www.freehaven.net/~arma/cv.html

Eckersley, Peter. 2014. [https://www.eff.org/files/surveillance-todos.pdf How can we protect the Internet against surveillance? Seven TODO items for users, web developers and protocol engineers]. San Francisco, CA: Electronic Frontier Foundation.


Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com.
Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com.