Tag: government


Found 59 results for 'government'.


1) authorization - Was the Raspberry Pi-related NASA JPL network breach primarily caused by the failure to keep an updated list of authorized devices?
2) banks - What would a country adopting Bitcoins as official currency have to reinvent?
3) currencies - How does the U.S. government view Bitcoin? Is it money?
4) legal - What prevents Bitcoins for being used to avoid taxation?
5) energy-consumption - Who Really Controls Bitcoin?
6) brute-force - Apple vs DOJ - how strong is the 10-try wipe brute force barrier?
7) cryptography - NSA Suite A Cryptography: Security through obscurity?
8) attack - How much would it cost for a government to undermine Bitcoins?
9) tls - Is there a way to make sure my government does not swap out SSL certificates?
10) operating-systems - Why does the government/military not use special operating systems?
11) legal - What does the US government do with seized coins?
12) tls - Let's Encrypt is based in the US and subject to US laws
13) security - What methods could a government use to shutdown Bitcoin?
14) vpn - Can government track VPN traffic if it has control on both ISP and website server?
15) government - Why not use a national ID as username for every website?
16) vpn - How difficult is it for ISPs to understand a user is using VPN?
17) hardware - Is there a "no-spy, no-backdoors standard" for telecom hardware manufacturing?
18) transactions - If Bitcoin is not controlled by the state, how come in some countries it is illegal?
19) exchanges - Exchange-based vs over-the-counter (OTC)
20) legal - What prevents Bitcoins for being used to avoid taxation?
21) banks - What would a country adopting Bitcoins as official currency have to reinvent?
22) security - How is the human end of the Bitcoin network secured?
23) agile - Challenges to the Agile approach on government projects
24) legal - Are there any publications about deanonymizing Bitcoin?
25) cryptography - Can we still provide confidentiality when cryptography is outlawed?
26) privacy - How Is It Possible For Hackers To "Dig Up The Dirt" On People?
27) email - Is personal email hosting really secure?
28) malware - Are there technical reasons why state actors may be more able of carrying out malware cyberattacks against critical infrastructure, than individuals?
29) security - Considering the potential upcoming legislation in the U.S., what moves can someone make before it goes into effect to protect themselves?
30) protocol - Is it possible to "unmine" particular coins?
31) encryption - What does Bluffdale mean for privacy?
32) passwords - Why does healthcare.gov exclude some special characters from passwords?
33) network - Is strategic cyber-warfare feasible today?
34) digital-signature - Is it possible to give legal value to signed web services?
35) encryption - What steps should one take to provide "reasonable" levels of privacy from a government?
36) licensing - Does NASA license the software that it develops?
37) disclosure - Found a security vulnerability on gov related site
38) encryption - Why aren't there FIPS level 4 devices on the market?
39) protocols - What happens if a pro-censor ISP has Telex key(s)?
40) encryption - Are there any modern governments which use a proprietary encryption algorithm?
41) security - What methods could a government use to shutdown Bitcoin?
42) tls - Why would an organization like the DoD prefer to use its own Root Certificate(s)?
43) legal - Can Bitcoin be "shutdown" if energy consumption for mining is heavily regulated?
44) security - Government disrupting reception of bitcoins. Is it possible?
45) phishing - What is the best way to respond to phishing emails sent from a government domain?
46) cryptography - Why have export controls for cryptography?
47) code-security - Why does the US government disallow dynamic languages for secure projects?
48) anonymity - How can intelligence services be so sure that Russia is the culprit?
49) integrity - Possible setup for a direct democracy voting system to prevent fraud
50) privacy - What are the implications of NSA surveillance on the average internet user?