Assorted Links (Computer Security) Leave a reply On the provable security of TLS (Part 1 and Part 2) US: laws of war apply to cyber attacks Calculating the cost of full disk encryption On the true economic cost of key retrieval by using the cloud Microsoft Attack Surface Analyzer and replacing ASP.NET Forms Authentication