Capabilities Digest

Helping to raise awareness of Capability Based Security.

Sunday, October 11, 2015

The .CABSEC fork in the road

›
Computer security is a mess, and to fix it, I believe that Linux, and indeed the entire open source stack, needs to get forked , I humbly su...
Saturday, October 10, 2015

The root cause of our security woes

›
This is a cut/paste of a comment I posted to /. The root cause of all of these security problems has been in plain sight since 1970 or so,...
Saturday, June 16, 2012

Genode

›
I've just come across Genode  which looks like it may offer a reasonably quick route to capability based security for all of us. They ar...
Saturday, May 26, 2012

Why ACL/UIC based security is futile, the IED example.

›
I wrote this on Slashdot in reply to comments about the relative security of Windows vs Linux. This is like arguing about the odds of an...
Saturday, November 5, 2011

›
Eric Drexler asks some interesting questions , and has points for discussion... here are my answers. Quiz - 1. Because traditionally t...
Tuesday, December 21, 2010

A project in the works

›
I'm putting together a project to implement CABsec on a small scale. I find myself wanting to play with an idea that doesn't seem ha...
Friday, April 16, 2010

A brilliant way to deal with spam.

›
I read this comment to a question about spam on Metafilter, and have been inspired. He uses unique email addresses in a way that is pretty ...
Tuesday, March 16, 2010

Cabsec by example... the fun game

›
There is a fun game called Bubble Breaker ... I like to play it while I'm waiting for things to compile, format, etc.. but it has one b...
Wednesday, March 3, 2010

Bush Era cybersecurity - my response

›
So, the Obama administration has declassified part of the "cybersecurity" planning of the Bush administration.... the story hit sl...
Monday, January 4, 2010

Capabilities, still out on the fringe, and misunderstood

›
I recently posted a comment on the Slashdot story You won't recognize the internet in 2020 , which said: It's not the Internet swit...
1 comment:
Thursday, December 3, 2009

A form to show off capabilities

›
The form below uses a capability (the string in the Token field) to replace the last data entry in The world's simplest capability demo ...

Less talk, more code

›
I can blog and talk for the rest of my life, and I doubt it would matter much. The fact is that it's very hard to wrap your mind around ...
Tuesday, December 1, 2009

The Mine! Project - Capabilities for the web

›
I've watched the demo videos (the second video gets closest to capabilities), and it appears that The Mine! Project is going to be bui...
Sunday, November 29, 2009

Capabilities explained... a Google tech talk worth watching

›
I highly recommend you watch http://www.youtube.com/watch?v=EGX2I31OhBE which is a Google tech talk video about Object Capabilities, heavy ...
Wednesday, April 29, 2009

Missing the point on Slashdot... yet again

›
Slashdot gets close to the truth... and then totally blows it, as usual.  A recent story pointed out that there will be funding for Minix, ...
Thursday, May 22, 2008

Capabilities Summarized

›
One of the things about digging up information about Capabilities based security is trying to find Google terms that have value. It's li...
Tuesday, May 20, 2008

Object Capabilities for Security - YouTube

›
This video at YouTube looks very interesting... I hope to be able to watch the whole thing later today. As an educational resource it's...
Saturday, May 17, 2008

AppArmor

›
AppArmor is a least-privilege system for Linux which uses the Linux Security Modules interface. Every "armored" application has a...

BeyondTrust | Privilege Manager

›
I came across BeyondTrust , which might be useful for people in a Windows Environment, because it helps lean towards a least privilege confi...

Persevere - First impressions

›
The Persevere project is an open source set of tools for persistence and distributed computing using intuitive standards-based JSON interfa...
Friday, May 16, 2008

A tweet in the wilderness, calling for help.

›
Thomas Hawk recently tweeted : I wish Blogger's moderate comments system was smart enough to whitelist people. I hate having to reappro...

OATH: Open sourcing the mark of the beast??

›
OATH - initiative for open authentication | All users, all devices, all networks. Ok, this one creeps me out a bit... they really, REALLY, ...

LBNL: Delegating responsibility in digital systems

›
Here's an interested article about Object Capability Systems, which they call ocaps from LBNL. They argue that the need to have a user...
1 comment:

OAuth

›
OAuth is: An open protocol to allow secure API authentication in a simple and standard method from desktop and web applications. OAuth is a...

What is Capabilities Digest?

›
I'm pushing an agenda, Capabilities as a means of fixing a lot of the problems with computer security. The most effective way to push an...
Home
View web version
Powered by Blogger.