Skip to content


Posts by: Davi Ottenheimer

  1. Gov Fumbles Over-Inflated Sony Hack Attribution Ball January 24, 2015

    Posted in History, Security.

    1 comment
  2. Was Stuxnet the “First”? January 21, 2015

    Posted in Energy, History, Security.

    No comments
  3. Movie Review: JSA (Joint Security Area) January 18, 2015

    Posted in Security.

    No comments
  4. A Political Science TL;DR for InfoSec January 14, 2015

    Posted in Security.

    No comments
  5. The Beginning Wasn’t Full-Disclosure January 12, 2015

    Posted in History, Security.

    No comments
  6. US President Calls for Federal 30-day Breach Notice January 12, 2015

    Posted in History, Security.

    1 comment
  7. The (Secret) History of the Banana Split January 3, 2015

    Posted in Food, History, Security.

    No comments
  8. Linguistics as a Tool for Cyber Attack Attribution December 27, 2014

    Posted in Security.

    No comments
  9. How the NSA Can Tell if You Are a Foreigner July 7, 2014

    Posted in History, Security.

    No comments
  10. In Defense of Microsoft’s Active Defense Against No-IP July 4, 2014

    Posted in Security.

    No comments
  11. 2014 Things Expo: New Security Models for the Internet of Things June 25, 2014

    Posted in Security.

    No comments
  12. Cyber-Colonialism and Beliefs About Global Development June 22, 2014

    Posted in History, Security.

    No comments
  13. US Wants to Help Africa on the Rise May 11, 2014

    Posted in Energy, History, Security.

    No comments
  14. 2014 Österreich Stammtisch: The UnCERTainty of Attribution April 26, 2014

    Posted in Security.

    No comments
  15. 2014 SOURCE Boston: Delivering Security at Big Data Scale April 12, 2014

    Posted in Security.

    No comments
  16. Yet “Unother” heartbleed Perspective (YUhP) April 11, 2014

    Posted in Security.

    No comments
  17. Troubled Audit Waters: Trustwave and the Target Breach March 26, 2014

    Posted in Security.

    1 comment
  18. #Hotmailgate: Where Don’t You Want to Go Today? March 26, 2014

    Posted in Security.

    No comments
  19. Mining and Visualizing YouTube Metadata for Threat Models February 14, 2014

    Posted in Energy, Food, Security.

    No comments
  20. What Surveillance Taught Me About the NSA and Tear Gas: It’s Time to Rethink our Twitters about Nightmares February 12, 2014

    Posted in History, Security.

    No comments
  21. Ethiopian Troops in Somalia Join AMISOM February 4, 2014

    Posted in History, Security.

    No comments
  22. On Kristallnacht: Tom Perkins Edition February 1, 2014

    Posted in History, Poetry, Sailing, Security.

    No comments
  23. Easy Hacks on Telephone Entry Systems January 9, 2014

    Posted in Security.

    No comments
  24. Hadoop Geographic Adoption December 6, 2013

    Posted in Security.

    No comments
  25. Internet of Things Under Attack! November 27, 2013

    Posted in Security.

    No comments