VULNERABILITIES EQUITIES PROCESS: Difference between revisions
From osint.info
Jump to navigationJump to search
(2 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
|- | |- | ||
|Date||Source||Title||Tags | |Date||Source||Title||Tags | ||
|- | |||
|20170308||zeit.de||[http://www.zeit.de/digital/datenschutz/2017-03/wikileaks-cia-vault7-android-iphone-hacker WikiLeaks: Die CIA kann jedes Telefon hacken, aber nicht gleichzeitig]||[[CIA]] / [[WIKILEAKS]] / [[VEP]] / [[BND]] / [[ANINSKI]] | |||
|- | |- | ||
|20161116||cyberlaw.stanford.edu||[http://cyberlaw.stanford.edu/events/government-hacking-vulnerabilities-equities-process Government Hacking: Vulnerabilities Equities Process]||[[VEP]] | |20161116||cyberlaw.stanford.edu||[http://cyberlaw.stanford.edu/events/government-hacking-vulnerabilities-equities-process Government Hacking: Vulnerabilities Equities Process]||[[VEP]] | ||
Line 10: | Line 12: | ||
|- | |- | ||
|20160818||lawfareblog.com||[https://www.lawfareblog.com/everything-you-know-about-vulnerability-equities-process-wrong Cybersecurity: Everything You Know About the Vulnerability Equities Process Is Wrong]||[[VEP]] | |20160818||lawfareblog.com||[https://www.lawfareblog.com/everything-you-know-about-vulnerability-equities-process-wrong Cybersecurity: Everything You Know About the Vulnerability Equities Process Is Wrong]||[[VEP]] | ||
|- | |||
|20160804||schneier.com||[https://www.schneier.com/blog/archives/2016/08/more_on_the_vul.html More on the Vulnerabilities Equities Process]||[[VEP]] | |||
|- | |||
|20160711||schneier.com||[https://www.schneier.com/blog/archives/2016/07/report_on_the_v.html Report on the Vulnerabilities Equities Process]||[[VEP]] | |||
|- | |- | ||
|} | |} |
Latest revision as of 19:44, 11 March 2017
Articles
Date | Source | Title | Tags |
20170308 | zeit.de | WikiLeaks: Die CIA kann jedes Telefon hacken, aber nicht gleichzeitig | CIA / WIKILEAKS / VEP / BND / ANINSKI |
20161116 | cyberlaw.stanford.edu | Government Hacking: Vulnerabilities Equities Process | VEP |
20160820 | fortune.com | Changing Face of Security: When Government Secrets Keep You Safe | VEP |
20160818 | lawfareblog.com | Cybersecurity: Everything You Know About the Vulnerability Equities Process Is Wrong | VEP |
20160804 | schneier.com | More on the Vulnerabilities Equities Process | VEP |
20160711 | schneier.com | Report on the Vulnerabilities Equities Process | VEP |