VULNERABILITIES EQUITIES PROCESS

From osint.info
Revision as of 19:44, 11 March 2017 by A (talk | contribs) (→‎Articles)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

Articles

Date Source Title Tags
20170308 zeit.de WikiLeaks: Die CIA kann jedes Telefon hacken, aber nicht gleichzeitig CIA / WIKILEAKS / VEP / BND / ANINSKI
20161116 cyberlaw.stanford.edu Government Hacking: Vulnerabilities Equities Process VEP
20160820 fortune.com Changing Face of Security: When Government Secrets Keep You Safe VEP
20160818 lawfareblog.com Cybersecurity: Everything You Know About the Vulnerability Equities Process Is Wrong VEP
20160804 schneier.com More on the Vulnerabilities Equities Process VEP
20160711 schneier.com Report on the Vulnerabilities Equities Process VEP

Resources

  • https://epic.org/privacy/cybersecurity/vep/
  • https://www.eff.org/files/2015/09/04/document_71_-_vep_ocr.pdf
Retrieved from "http://osint.info:443/index.php?title=VULNERABILITIES_EQUITIES_PROCESS&oldid=35676"
Category:
  • Strategies

Navigation menu

Page actions

  • Page
  • Discussion
  • Read
  • View source
  • History

Page actions

  • Page
  • Discussion
  • More
  • Tools

Personal tools

  • Log in

Navigation

  • Main page
  • Recent changes
  • Random page
  • Help about MediaWiki

Tools

  • What links here
  • Related changes
  • Special pages
  • Printable version
  • Permanent link
  • Page information
Creative Commons Zero (Public Domain)
Powered by MediaWiki
  • This page was last edited on 11 March 2017, at 19:44.
  • Content is available under Creative Commons Zero (Public Domain) unless otherwise noted.
  • Privacy policy
  • About osint.info
  • Disclaimers