Random numbers to protect privacy in a pandemic app

A computer system, like a car or a coffee machine, is something designed to meet some requirements.  These requirements usually force the designer to make a compromise, based on which requirements get more attention than others.  (Which is the best car?  It depends on whether speed, size, sustainability etc. are most important to you.) One … Continue reading Random numbers to protect privacy in a pandemic app

Security and a voice-controlled internet-connected cooker

I have seen adverts for a NEFF cooker that you can control with your voice via Alexa. This is spiffy, but I can also see potential security problems.  I’m not advocating attacking Alexa or a NEFF cooker – this article is a standard-issue discussion of security problems, to help people improve security.  I hope I’m … Continue reading Security and a voice-controlled internet-connected cooker

Authentication, authorisation and the chain of trust

I recently walked by my old college.  There was a sign outside: Closed to visitors.  I realised that two cards in my wallet would get me in, which made me think of some security concepts: the difference between authentication and authorisation, and the chain of trust.  I’ll go into those a bit in this article, … Continue reading Authentication, authorisation and the chain of trust