Tag: enforcement
-
Hacker News: Reverse Engineering iOS 18 Inactivity Reboot
Source URL: https://naehrdine.blogspot.com/2024/11/reverse-engineering-ios-18-inactivity.html Source: Hacker News Title: Reverse Engineering iOS 18 Inactivity Reboot Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the new inactivity reboot feature in iOS 18, which adds a significant layer of security by forcing a device reboot after three days of inactivity. This feature aims to protect…
-
Hacker News: FTC to launch investigation into Microsoft’s cloud business
Source URL: https://www.ft.com/content/62f361eb-ce52-47c1-9857-878cfe298d54 Source: Hacker News Title: FTC to launch investigation into Microsoft’s cloud business Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the Federal Trade Commission’s (FTC) investigation into Microsoft’s cloud computing practices, highlighting potential anti-competitive behavior that may hinder customer migration to rival platforms. The investigation aligns with ongoing…
-
Schneier on Security: Criminals Exploiting FBI Emergency Data Requests
Source URL: https://www.schneier.com/blog/archives/2024/11/criminals-exploiting-fbi-emergency-data-requests.html Source: Schneier on Security Title: Criminals Exploiting FBI Emergency Data Requests Feedly Summary: I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass encryption, the bad guys will use it too. Turns out the same…