TechLetters #36: 0day use on the rise; some examples in use; tracking consent; padlocks
techletters.substack.com
Éditorial Security China’s cybersecurity law. It applied to security research and vulnerability disclosure. “Tech experts in China who find a weakness in computer security would be required to tell the government and couldn’t sell that knowledge under rules further tightening the Communist Party’s control over information … The rules would ban private sector experts who find “zero day,” or previously unknown security weaknesses, and sell the information to police, spy agencies or companies
TechLetters #36: 0day use on the rise; some examples in use; tracking consent; padlocks
TechLetters #36: 0day use on the rise; some…
TechLetters #36: 0day use on the rise; some examples in use; tracking consent; padlocks
Éditorial Security China’s cybersecurity law. It applied to security research and vulnerability disclosure. “Tech experts in China who find a weakness in computer security would be required to tell the government and couldn’t sell that knowledge under rules further tightening the Communist Party’s control over information … The rules would ban private sector experts who find “zero day,” or previously unknown security weaknesses, and sell the information to police, spy agencies or companies