Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store

Editorials

Editorials

Security and Privacy are the same argument.

In the fast paced and insanely stupid argument between privacy advocates and national security advocates we often hear how we need to give up one or the other. The security guys say that privacy will block criminal activity so we need to give up some of that. On the other side the Privacy gang feels that giving up privacy is only hurting the people that are not doing anything wrong. They also feel it has an impact on free speech and limits discourse. What neither side is getting is that they both are right. Strong privacy protections and encryption allow for better and more secure communication. The complement each other in a way that no one seems to get.

Details
By Sean Kalinich
Sean Kalinich
Jan 22
Hits: 3979
  • Hacking
  • Security
  • Encryption
  • Protection
  • Breaches
  • Pointtopoint Encryption

Read more: Security and Privacy are the same argument.

No comments on “Security and Privacy are the same argument.”
Editorials

HBM Vs GDDR in 2016 for the GPU crown.

As most people are aware, AMD dropped the first GPUs to utilize HBM (High Bandwidth Memory). These GPUs use a form of HBM called 2.5D which requires the use of an interproser layer than both the memory and the GPU sit on. This is opposed to the 3D stack in which the memory sits on top of the processor that owns it. The traditional stacking of 3D Memory provides significant performance benefits, but would require a different chip for every memory density you plan on releasing. In the GPU world this can be a big problem and is why both AMD and NVIDIA have opted for the 2.5D method.

Details
By Sean Kalinich
Sean Kalinich
Dec 14
Hits: 6249
  • nVidia
  • AMD
  • GPU
  • Memory
  • HBM
  • Interposer

Read more: HBM Vs GDDR in 2016 for the GPU crown.

No comments on “HBM Vs GDDR in 2016 for the GPU crown.”
Editorials

When will enough be enough when it comes to IoT security? VTech and Hello Barbie

When things are not quite right you always hope for that “ah-ha” moment when everyone realizes the issue and will actually begin to work on a solution. For connected devices we have been hoping for that since they were first introduced and are still waiting for the industry to have that moment. We thought that perhaps it would happen when a host of connected cameras were compromised allowing people to spy on and even talk to children that were being monitored by them. However, while the hole was covered up with tape (not really fixed) there was no general outcry to have these connected devices secure properly.

Details
By Sean Kalinich
Sean Kalinich
Dec 08
Hits: 3932
  • Hacking
  • Security
  • Cloud
  • Breaches
  • IoT
  • Hello Barbie
  • Vtech
  • BlueBox

Read more: When will enough be enough when it comes to IoT...

No comments on “When will enough be enough when it comes to IoT security? VTech and Hello Barbie”
Editorials

It’s a failure of imagination that will always get you

Back in 2007 or so I was asked to write a white paper on the subject of why Intel was able to pass AMD as quickly as they did. This is back in the AM2+ days when Intel was dropping Conroe on the world. Many people were surprised that Intel made this shift so quickly when you consider how badly AMD had beaten the P4. It was incorrectly assumed that AMD had reach a peak that Intel could not touch. Because of this they did not push their advantage. Instead they opted to move in a very different direction and purchase ATi for way more money than they should have. This one move started the long decline of AMD as we knew it. It was a massive strategic error and it all came down to one thing. A failure of management and stockholders’ to imagine that Intel could so easily blow past AMD’s performance lead. This type of failure can have catastrophic consequences in the business world and in security.

Details
By Sean Kalinich
Sean Kalinich
Nov 20
Hits: 2612
  • Hacking
  • Security
  • Breach
  • Application Control
  • Attack Vectors

Read more: It’s a failure of imagination that will always...

No comments on “It’s a failure of imagination that will always get you”
Editorials

The cloud, IoT, vendors and security: things that do not go together.

This is not the first time that I have spoken out about cloud computing (internet based, or the Internet of Things and the way they are impacting the ability to secure a network. It is also not going to be the last. Simply put, the concept that everything needs to be controlled by a computer and talk back to some sort of internet based cloud show a level of ignorance that should not still be out there. Sadly it is and companies are still trying to push the cloud and connected device mentality despite the inherent and known security flaws that exist.

Details
By Sean Kalinich
Sean Kalinich
Oct 15
Hits: 3392
  • Hacking
  • Security
  • Malware
  • Cloud Computing
  • Target
  • Breaches
  • Internet of Things
  • IoT

Read more: The cloud, IoT, vendors and security: things...

No comments on “The cloud, IoT, vendors and security: things that do not go together.”

More Articles …

  1. A security researcher's lot is not a happy one, but it should be
  2. Has the glut of IoT devices given the game to the Bad Guys?
  3. Privacy: it doesn’t mean what you think it means
  4. E3 and why we just do not bother
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11

Page 7 of 89

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech