

{"id":9397,"date":"2018-04-03T10:20:35","date_gmt":"2018-04-03T15:20:35","guid":{"rendered":"https:\/\/rud.is\/b\/?p=9397"},"modified":"2018-04-03T10:20:35","modified_gmt":"2018-04-03T15:20:35","slug":"2018-ieee-security-privacy-filtered-paper-dump","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/","title":{"rendered":"2018 IEEE Security &#038; Privacy (Filtered) Paper Dump"},"content":{"rendered":"<p>The <a href=\"https:\/\/csdl.computer.org\/csdl\/proceedings\/sp\/2018\/4353\/00\/index.html\">2018 IEEE Security &amp; Privacy Conference<\/a> is in May but they&#8217;ve posted their full proceedings and it&#8217;s better to grab them early than to wait for it to become part of a paid journal offering.<\/p>\n<p>There are <em>alot<\/em> of papers. Not all match my interests but (fortunately?) many did and I&#8217;ve filtered down a list of the more interesting (to me) ones. It&#8217;s encouraging to see academic cybersecurity researchers branching out across a whole host of areas.<\/p>\n<p>I can&#8217;t promise a <a href=\"https:\/\/blog.acolyer.org\/\">the morning paper<\/a>-esque daily treatment of these on the blog but I&#8217;ll likely exposit a few of them over the coming weeks. I&#8217;ve emoji&#8217;d a few that stood out. Order is the order I read them in (no other meaning to the order).<\/p>\n<ul>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a629.pdf\">Stealing Hyperparameters in Machine Learning<\/a><\/li>\n<li>? <a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a035.pdf\">On the Economics of Offline Password Cracking<\/a><\/li>\n<li>??\u200d? <a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a134.pdf\">Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes<\/a><\/li>\n<li>? <a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a221.pdf\">Privacy Risks with Facebook\u2019s PII-based Targeting: Auditing a Data Broker\u2019s Advertising Interface<\/a><\/li>\n<li>? <a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a288.pdf\">Tracking Certificate Misissuance in the Wild<\/a><\/li>\n<li>? <a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a373.pdf\">Computer Security and Privacy for Refugees in the United States<\/a><\/li>\n<li>\u26a1\ufe0f <a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a438.pdf\">Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones<\/a><\/li>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a102.pdf\">The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators<\/a><\/li>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a646.pdf\">Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies &amp; Vulnerabilities<\/a><\/li>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a773.pdf\">Tracking Ransomware End-to-end<\/a><\/li>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a723.pdf\">Surveylance: Automatically Detecting Online Survey Scams<\/a><\/li>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a853.pdf\">When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts<\/a><\/li>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a116.pdf\">Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors<\/a><\/li>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a339.pdf\">A Formal Treatment of Accountable Proxying over TLS<\/a><\/li>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a613.pdf\">SoK: \u201cPlug &amp; Pray\u201d Today \u2013 Understanding USB Insecurity in Versions 1 through C<\/a><\/li>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a740.pdf\">Oblix: An Efficient Oblivious Search Index<\/a><\/li>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a561.pdf\">A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks<\/a><\/li>\n<li><a href=\"https:\/\/rud.is\/dl\/ieee-sp-2018\/435301a870.pdf\">Understanding Linux Malware<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The 2018 IEEE Security &amp; Privacy Conference is in May but they&#8217;ve posted their full proceedings and it&#8217;s better to grab them early than to wait for it to become part of a paid journal offering. There are alot of papers. Not all match my interests but (fortunately?) many did and I&#8217;ve filtered down a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[664,681,709,754],"tags":[],"class_list":["post-9397","post","type-post","status-publish","format-standard","hentry","category-appsec","category-cybersecurity","category-data-driven-security","category-data-science"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2018 IEEE Security &amp; Privacy (Filtered) Paper Dump - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2018 IEEE Security &amp; Privacy (Filtered) Paper Dump - rud.is\" \/>\n<meta property=\"og:description\" content=\"The 2018 IEEE Security &amp; Privacy Conference is in May but they&#8217;ve posted their full proceedings and it&#8217;s better to grab them early than to wait for it to become part of a paid journal offering. There are alot of papers. Not all match my interests but (fortunately?) many did and I&#8217;ve filtered down a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-03T15:20:35+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2018\\\/04\\\/03\\\/2018-ieee-security-privacy-filtered-paper-dump\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2018\\\/04\\\/03\\\/2018-ieee-security-privacy-filtered-paper-dump\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"2018 IEEE Security &#038; Privacy (Filtered) Paper Dump\",\"datePublished\":\"2018-04-03T15:20:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2018\\\/04\\\/03\\\/2018-ieee-security-privacy-filtered-paper-dump\\\/\"},\"wordCount\":299,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"articleSection\":[\"AppSec\",\"Cybersecurity\",\"data driven security\",\"data science\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2018\\\/04\\\/03\\\/2018-ieee-security-privacy-filtered-paper-dump\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2018\\\/04\\\/03\\\/2018-ieee-security-privacy-filtered-paper-dump\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2018\\\/04\\\/03\\\/2018-ieee-security-privacy-filtered-paper-dump\\\/\",\"name\":\"2018 IEEE Security & Privacy (Filtered) Paper Dump - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"datePublished\":\"2018-04-03T15:20:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2018\\\/04\\\/03\\\/2018-ieee-security-privacy-filtered-paper-dump\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2018\\\/04\\\/03\\\/2018-ieee-security-privacy-filtered-paper-dump\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2018\\\/04\\\/03\\\/2018-ieee-security-privacy-filtered-paper-dump\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2018 IEEE Security &#038; Privacy (Filtered) Paper Dump\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2018 IEEE Security & Privacy (Filtered) Paper Dump - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/","og_locale":"en_US","og_type":"article","og_title":"2018 IEEE Security & Privacy (Filtered) Paper Dump - rud.is","og_description":"The 2018 IEEE Security &amp; Privacy Conference is in May but they&#8217;ve posted their full proceedings and it&#8217;s better to grab them early than to wait for it to become part of a paid journal offering. There are alot of papers. Not all match my interests but (fortunately?) many did and I&#8217;ve filtered down a [&hellip;]","og_url":"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/","og_site_name":"rud.is","article_published_time":"2018-04-03T15:20:35+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"2018 IEEE Security &#038; Privacy (Filtered) Paper Dump","datePublished":"2018-04-03T15:20:35+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/"},"wordCount":299,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"articleSection":["AppSec","Cybersecurity","data driven security","data science"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/","url":"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/","name":"2018 IEEE Security & Privacy (Filtered) Paper Dump - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2018-04-03T15:20:35+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"2018 IEEE Security &#038; Privacy (Filtered) Paper Dump"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-2rz","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":6351,"url":"https:\/\/rud.is\/b\/2017\/09\/17\/armchair-quarterbacking-systemic-organization-and-industry-failures\/","url_meta":{"origin":9397,"position":0},"title":"Armchair Quarterbacking Systemic Organization and Industry Failures","author":"hrbrmstr","date":"2017-09-17","format":false,"excerpt":"insert(post, \"{ 'standard_disclaimer' : 'My opinion, not my employer\\'s' }\") This is a post about the fictional company FredCo. If the context or details presented by the post seem familiar, it's purely coincidental. This is, again, a fictional story. Let's say FredCo had a pretty big breach that (fictionally) garnered\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":13120,"url":"https:\/\/rud.is\/b\/2021\/07\/20\/packet-maze-solving-a-cyberdefenders-pcap-puzzle-with-r-zeek-and-tshark\/","url_meta":{"origin":9397,"position":1},"title":"Packet Maze: Solving a CyberDefenders PCAP Puzzle with R, Zeek, and tshark","author":"hrbrmstr","date":"2021-07-20","format":false,"excerpt":"It was a rainy weekend in southern Maine and I really didn't feel like doing chores, so I was skimming through RSS feeds and noticed a link to a PacketMaze challenge in the latest This Week In 4n6. Since it's also been a while since I've done any serious content\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3775,"url":"https:\/\/rud.is\/b\/2015\/11\/08\/visualizing_survey_data\/","url_meta":{"origin":9397,"position":2},"title":"Visualizing Survey Data : Comparison Between Observations","author":"hrbrmstr","date":"2015-11-08","format":false,"excerpt":"Cybersecurity is a domain that really likes surveys, or at the very least it has many folks within it that like to conduct and report on surveys. One recent survey on threat intelligence is in it's second year, so it sets about comparing answers across years. Rather than go into\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/11\/Visualizing_Survey_Data___Comparison_Between_Observations.png?fit=1200%2C721&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/11\/Visualizing_Survey_Data___Comparison_Between_Observations.png?fit=1200%2C721&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/11\/Visualizing_Survey_Data___Comparison_Between_Observations.png?fit=1200%2C721&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/11\/Visualizing_Survey_Data___Comparison_Between_Observations.png?fit=1200%2C721&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/11\/Visualizing_Survey_Data___Comparison_Between_Observations.png?fit=1200%2C721&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":10800,"url":"https:\/\/rud.is\/b\/2018\/05\/24\/gdpr-unintended-consequences-part-1-increasing-wordpress-blog-exposure\/","url_meta":{"origin":9397,"position":3},"title":"GDPR Unintended Consequences Part 1 \u2014 Increasing WordPress Blog Exposure","author":"hrbrmstr","date":"2018-05-24","format":false,"excerpt":"I pen this mini-tome on \"GDPR Enforcement Day\". The spirit of GDPR is great, but it's just going to be another Potempkin Village in most organizations much like PCI or SOX. For now, the only thing GDPR has done is made GDPR consulting companies rich, increased the use of javascript\u2026","rel":"","context":"In &quot;Commentary&quot;","block_context":{"text":"Commentary","link":"https:\/\/rud.is\/b\/category\/commentary\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1300,"url":"https:\/\/rud.is\/b\/2012\/06\/16\/weis-2012-best-of-the-best\/","url_meta":{"origin":9397,"position":4},"title":"WEIS 2012 :: Best of the Best","author":"hrbrmstr","date":"2012-06-16","format":false,"excerpt":"Sadly, I could not make it to this year's Workshop on the Economics of Information Security. However, the intrepid conference organizers were quick to post the papers that were presented, and I had a chance to sift through them to pick out what I believe to be the best of\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":25134,"url":"https:\/\/rud.is\/b\/2025\/04\/29\/rsac-2025-sets-a-dangerous-precedent-for-cybersecurity-leadership\/","url_meta":{"origin":9397,"position":5},"title":"RSAC 2025 Sets A Dangerous Precedent for Cybersecurity Leadership","author":"hrbrmstr","date":"2025-04-29","format":false,"excerpt":"(I posted this on LI, but I like to own my content, so am also posting here.) The cybersecurity community deserves better than what we're witnessing at RSAC 2025, today. While Kristi Noem delivers today's keynote, the absence of traditional cybersecurity leaders from agencies like NSA and CISA speaks volumes\u2026","rel":"","context":"In &quot;Commentary&quot;","block_context":{"text":"Commentary","link":"https:\/\/rud.is\/b\/category\/commentary\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/9397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=9397"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/9397\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=9397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=9397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=9397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}