Papers

WHEN INTEROPERABILITY MANDATES WEAKEN SECURITY – JIT HAPPENS

Holy Cow! We looked at the very first interoperability request publicly posted as part
of Europe’s Digital Markets Act’s (DMA) new interoperability rules and it’s a digital doozy that would enable serious new security threats. A developer has requested that under the DMA’s new interoperability rules, Apple should provide it with direct access to features of its Just-In-Time Compiler or JIT engine – which is a core capability built into all major browser engines.

Learn More +

Experts React to UK Proposal to Destroy Digital Privacy

The Washington Post reported that the United Kingdom Government has secretly ordered Apple to weaken end-to-end encryption for data stored in iCloud, forcing the company to create a backdoor to its fully encrypted data. Once a backdoor is created, it can be exploited by anyone who finds it. If the reporting is accurate, it represents an incredibly dangerous overreach that threatens to put the security of millions of people’s data at risk. 

Learn More +

The Global IT Crisis and Third Party Vulnerabilities

This week’s global IT crisis affecting businesses around the world should be a wake up call to us all.  DMA requirements for mandatory third party access to the operating system will make personal smartphones and tablets vulnerable to new and currently unimaginable emerging threats.

Learn More +

Taking Spyware and Other Mobile Threats Seriously

Last March, in the forward to the White House Cybersecurity strategy, the President wrote, “[W]hen we pick up our smart phones to keep in touch with loved ones, log on to social media to share our ideas with one another, or connect to the Internet to run a business, we need the ability to trust that the underlying digital ecosystem is safe, reliable, and secure.”

Learn More +