{"id":1042,"date":"2012-07-11T20:19:45","date_gmt":"2012-07-11T18:19:45","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=1042"},"modified":"2024-10-14T13:57:45","modified_gmt":"2024-10-14T11:57:45","slug":"assorted-links-governmentssecurity","status":"publish","type":"post","link":"https:\/\/cerezo.name\/blog\/2012\/07\/11\/assorted-links-governmentssecurity\/","title":{"rendered":"Assorted Links (Governments<span class=\"amp\">&amp;<\/span>Security)"},"content":{"rendered":"<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"text-align: justify;\">Epic Catch-22, brought to you by the <span class=\"caps\">NSA<\/span>: <a href=\"http:\/\/www.wired.com\/dangerroom\/2012\/06\/nsa-spied\/\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">It Would Violate Your Privacy to Say if We Spied on&nbsp;You<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/arstechnica.com\/information-technology\/2012\/06\/how-to-blow-6-billion-on-a-tech-project\" target=\"_blank\" rel=\"noopener\">Ground Mobile Radio<\/a>, the Software-Defined Radio that will never see the light of&nbsp;day<\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/threatpost.com\/en_us\/blogs\/diving-flame-researchers-find-link-stuxnet-061112\" target=\"_blank\" rel=\"noopener\">Flame<\/a> and <a href=\"http:\/\/www.nytimes.com\/2012\/06\/01\/world\/middleeast\/obama-ordered-wave-of-cyberattacks-against-iran.html\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Stuxnet<\/a>, the confessed work of the United States of America<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.cwi.nl\/news\/2012\/cwi-cryptanalist-discovers-new-cryptographic-attack-variant-in-flame-spy-malware\" target=\"_blank\" rel=\"noopener\">Advanced crypto-research just in gov-malware<\/a><\/li>\n<li><a href=\"http:\/\/marginalrevolution.com\/marginalrevolution\/2012\/05\/solomons-knot-and-gray-markets.html\" target=\"_blank\" rel=\"noopener\">Solomon\u2019s Knot: Law, Freedom and Development<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Epic Catch-22, brought to you by the <span class=\"caps\">NSA<\/span>: It Would Violate Your Privacy to Say if We Spied on&nbsp;You Ground Mobile Radio, the Software-Defined Radio that will never see the light of&nbsp;day Flame and Stuxnet, the confessed work of the United States of America Advanced crypto-research just in gov-malware Solomon\u2019s Knot: Law, Freedom and Development<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[6,18],"tags":[],"_links":{"self":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1042"}],"collection":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=1042"}],"version-history":[{"count":3,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1042\/revisions"}],"predecessor-version":[{"id":1591,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1042\/revisions\/1591"}],"wp:attachment":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=1042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=1042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=1042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}