Skip to content


Posts by: Davi Ottenheimer

  1. Antenna: Computer Viruses and Hacking (BBC 1989) March 6, 2015

    Posted in History, Security.

    No comments
  2. SuperFish Exploit: Kali on Raspberry Pi 2 February 21, 2015

    Posted in Security.

    No comments
  3. Cyberwar revisionism: 2008 BTC pipeline explosion February 16, 2015

    Posted in Energy, History, Security.

    No comments
  4. Eventually Navies Take Over February 11, 2015

    Posted in History, Sailing, Security.

    No comments
  5. Samsung TV: Would You Trust It? February 10, 2015

    Posted in Security.

    No comments
  6. The DPRK Humanitarian Crisis February 9, 2015

    Posted in Security.

    No comments
  7. A Remote Threat: The White House Drone Incident February 6, 2015

    Posted in Security.

    No comments
  8. Beware the Sony Errorists February 3, 2015

    Posted in Security.

    No comments
  9. Gov Fumbles Over-Inflated Sony Hack Attribution Ball January 24, 2015

    Posted in History, Security.

    1 comment
  10. Was Stuxnet the “First”? January 21, 2015

    Posted in Energy, History, Security.

    No comments
  11. Movie Review: JSA (Joint Security Area) January 18, 2015

    Posted in Security.

    No comments
  12. A Political Science TL;DR for InfoSec January 14, 2015

    Posted in Security.

    No comments
  13. The Beginning Wasn’t Full-Disclosure January 12, 2015

    Posted in History, Security.

    No comments
  14. US President Calls for Federal 30-day Breach Notice January 12, 2015

    Posted in History, Security.

    1 comment
  15. The (Secret) History of the Banana Split January 3, 2015

    Posted in Food, History, Security.

    No comments
  16. Linguistics as a Tool for Cyber Attack Attribution December 27, 2014

    Posted in Security.

    No comments
  17. How the NSA Can Tell if You Are a Foreigner July 7, 2014

    Posted in History, Security.

    No comments
  18. In Defense of Microsoft’s Active Defense Against No-IP July 4, 2014

    Posted in Security.

    No comments
  19. 2014 Things Expo: New Security Models for the Internet of Things June 25, 2014

    Posted in Security.

    No comments
  20. Cyber-Colonialism and Beliefs About Global Development June 22, 2014

    Posted in History, Security.

    No comments
  21. US Wants to Help Africa on the Rise May 11, 2014

    Posted in Energy, History, Security.

    No comments
  22. 2014 Österreich Stammtisch: The UnCERTainty of Attribution April 26, 2014

    Posted in Security.

    No comments
  23. 2014 SOURCE Boston: Delivering Security at Big Data Scale April 12, 2014

    Posted in Security.

    No comments
  24. Yet “Unother” heartbleed Perspective (YUhP) April 11, 2014

    Posted in Security.

    No comments
  25. Troubled Audit Waters: Trustwave and the Target Breach March 26, 2014

    Posted in Security.

    1 comment