Difference between revisions of "VULNERABILITIES EQUITIES PROCESS"

From OSINT.INFO
Jump to navigationJump to search
 
(2 intermediate revisions by the same user not shown)
Line 4: Line 4:
 
|-
 
|-
 
|Date||Source||Title||Tags
 
|Date||Source||Title||Tags
 +
|-
 +
|20170308||zeit.de||[http://www.zeit.de/digital/datenschutz/2017-03/wikileaks-cia-vault7-android-iphone-hacker WikiLeaks: Die CIA kann jedes Telefon hacken, aber nicht gleichzeitig]||[[CIA]] / [[WIKILEAKS]] / [[VEP]] / [[BND]] / [[ANINSKI]]
 
|-
 
|-
 
|20161116||cyberlaw.stanford.edu||[http://cyberlaw.stanford.edu/events/government-hacking-vulnerabilities-equities-process Government Hacking: Vulnerabilities Equities Process]||[[VEP]]
 
|20161116||cyberlaw.stanford.edu||[http://cyberlaw.stanford.edu/events/government-hacking-vulnerabilities-equities-process Government Hacking: Vulnerabilities Equities Process]||[[VEP]]
Line 10: Line 12:
 
|-
 
|-
 
|20160818||lawfareblog.com||[https://www.lawfareblog.com/everything-you-know-about-vulnerability-equities-process-wrong Cybersecurity: Everything You Know About the Vulnerability Equities Process Is Wrong]||[[VEP]]
 
|20160818||lawfareblog.com||[https://www.lawfareblog.com/everything-you-know-about-vulnerability-equities-process-wrong Cybersecurity: Everything You Know About the Vulnerability Equities Process Is Wrong]||[[VEP]]
 +
|-
 +
|20160804||schneier.com||[https://www.schneier.com/blog/archives/2016/08/more_on_the_vul.html More on the Vulnerabilities Equities Process]||[[VEP]]
 +
|-
 +
|20160711||schneier.com||[https://www.schneier.com/blog/archives/2016/07/report_on_the_v.html Report on the Vulnerabilities Equities Process]||[[VEP]]
 
|-
 
|-
 
|}
 
|}

Latest revision as of 19:44, 11 March 2017