Get a Pentest and security assessment of your IT network.

Cyber Security

The Value of Self-Enforcing Protocols

Schneier: There are several ways two people can divide a piece of cake in half. One way is to find someone impartial to do it for them, but it requires another person. Another way is for one person to divide the piece, and the other person to complain (to the police, a judge, or his parents) if he doesn t think it s fair. A third way, known by kids, pot smokers, and everyone else who needs to divide something up quickly and fairly, is called cut-and-choose.

Source: https://threatpost.com/value-self-enforcing-protocols-081009/72980/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation