/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Company

TLS

17 articles stable
Articles
17
mentions
Velocity
0.0%
growth rate
Acceleration
+0.500
velocity change
Sources
12
publications

Coverage Timeline

2024-07-11
Ars Technica 26 related

Researchers detail the Blast-RADIUS MD5-based vulnerability affecting RADIUS, a widely used network access authentication protocol first developed in 1991

AWAITING ANALYSIS  —  This vulnerability is currently awaiting analysis. Microsoft Support : KB5040268: How to manage the Access-Request packets attack vulnerability associated with CVE-2024-3596 Conn...

2023-12-20
Ars Technica 15 related

Researchers detail a MITM attack on SSH that can break the integrity of the protocol, the first “practical attack of its kind”; fixes face compatibility issues

SSH is an internet standard that provides secure access to network services … Connor Jones / The Register : SSH shaken, not stirred by Terrapin vulnerability Terrapin Attack : Terrapin Attack: Breakin...

2022-11-08
Washington Post

An investigation shows TrustCor Systems, used by Chrome, Safari, and Firefox as a root certificate authority, has connections to US intel and law enforcement

TrustCor Systems vouches for the legitimacy of websites.  But its physical address is a UPS Store in Toronto. Tweets: @shashj , @josephmenn , @jvagle , @matthew_d_green , and @v0max Tweets: Shashank J...

2022-10-06
TechCrunch 3 related

Two weeks ahead of China's 20th communist party congress, censors seem to be blocking TLS-based circumvention tools that locals use to bypass the Great Firewall

TechCrunch :

2022-03-11
BleepingComputer 8 related

Russia has created its own trusted TLS certificate authority as sanctions prevent Russian sites from renewing existing TLS certificates

Yeah, RIGHT TechRadar : Russia creates its own TLS certificate authority to bypass sanctions Leigh Mc Gowran / Silicon Republic : Russia issues its own TLS certificates to get past global sanctions Ad...

2022-01-17
Rolling Stone 9 related

The UK government hires ad agency M&C Saatchi to run a publicity campaign criticizing Meta's plans to make Messenger end-to-end encrypted by default

only because the UK gov would be happy to let competitors throw Facebook under the bus. But not the long term. Matthew Green / @matthew_d_green : If somehow it looked like we were headed to a world wi...

2022-01-16
Rolling Stone

UK government hires M&C Saatchi ad agency to run a publicity campaign criticizing Meta's plans to make Messenger e2e encrypted by default

The Home Office has hired a high-end ad agency to mobilize public opinion against encrypted communications — with plans that include some shockingly manipulative tactics Tweets: @jamesrbuk , @rupertg ...

2021-11-04
MIT Technology Review

How US agencies are preparing for “post-quantum cryptography” against attackers who harvest sensitive data now for decryption in the future

The US government is starting a generation-long battle against the threat next-generation computers pose to encryption. Tweets: @techreview , @techreview , @aarongrunwald , @statecreative74 , @royvanr...

2021-11-03
TIME

Sources: Facebook has done little to act on the Islamophobic “Love Jihad” conspiracy theory on its platform in India due to “political sensitivities”

In a video posted to Facebook in November 2020, an extremist priest called for Hindus to rise up and begin killing Muslims in India. Tweets: @jason_kint , @damomusings , @verambergen , @skjain_05 , @k...

2020-01-24
CyberScoop 7 related

Experts say FTI's report on the hack of Bezos' phone does not explain why FTI wasn't able to decrypt the malicious file or perform actions like jailbreaking

@billmarczak @ErrataRob @matthew_d_green + more in @CyberScoopNews https://www.cyberscoop.com/... Alex Gantman / @againsthimself : Ok, this report is pretty bad and only serves to lower (if not wholly...

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...