About:

Robert Graham, author of Cybersect, writes on cybersecurity; created BlackICE, IPS, sidejacking, and masscan; now blogging, coding, cyber-rights, and Internet scanning.

Website:

Specializations:

Interests:

Cybersecurity Cyber-rights Internet scanning Coding
Subscribe to RSS:
The post discusses the historical relationship between the OSI Model and IBM mainframe technology, arguing that while ESR's view attributes the OSI Model's development to European academics, it was also heavily influenced by IBM's...
The Secret Service's announcement of foiling a national security threat related to a SIM farm is criticized as misleading. The author argues that the operation is a typical criminal enterprise rather than a significant espionage t...
The article provides a detailed history of kernel threads, distinguishing them from userspace threads. It discusses the evolution of threading in operating systems, starting from the early days of single-threaded processes to the ...
The blog post critiques a forensic analysis claiming that the Russian hacker Guccifer 2.0 was physically located in the U.S. based on file transfer speeds and timestamps from a hacked ZIP file. The author, a forensics expert, argu...
The post recounts the Ciscogate incident, where cybersecurity researcher Mike Lynn discovered vulnerabilities in Cisco routers and planned to disclose them at the BlackHat conference. Cisco's lawyers intervened, attempting to supp...
The author critiques the media's portrayal of the CrowdStrike failure, arguing that many so-called experts are making unfounded assumptions and pushing political agendas. He clarifies misconceptions about the nature of the failure...
The post presents a satirical take on the certification of cybersecurity professionals, posing a series of cynical questions and answers that highlight the perceived futility and absurdity of various cybersecurity concepts and pra...
The author critiques the New York Times for quoting high-profile individuals, like Anthony J. Ferrante, instead of technical experts in cybersecurity discussions. The author argues that Ferrante's forensic analysis of Jeff Bezos's...
Robert Graham argues that the speed of AI-generated code for parsing IPv4 addresses is due to modern CPU optimizations, not the AI itself, highlighting flaws in benchmark testing.
The post clarifies the difference between mathematical precision and engineering practice regarding the value of pi, highlighting the issue of 'hallucinated' digits in calculations.
Robert Graham debunks a conspiracy theory by Spoonamoore, which alleges that Elon Musk and others are conspiring to steal the 2024 election for Trump. The theory includes claims about fraudulent 'bullet ballots', Musk's 'free-spee...
The post discusses the security vulnerabilities of Dominion Voting Systems' election management servers, particularly focusing on the claim of a hardcoded backdoor password. It explains that while the password exists, the real iss...
The post discusses the evolving landscape of cybersecurity, particularly regarding the use of public WiFi and the necessity of VPNs. The author critiques outdated expert advice, emphasizing that SSL/TLS encryption has made public ...
The author critiques Linus Torvalds' recent rant regarding a pull request that added macros to the Linux kernel, highlighting both the strengths and weaknesses of Torvalds' arguments. The author, a senior programmer, discusses the...
The article reveals that the Epstein files' redactions are ineffective, allowing the text to be easily accessed rather than truly removed.
The blog post debunks conspiracy theories claiming that 'bullet ballots'—ballots containing only votes for the presidential race—indicate election fraud in the 2024 election. The author uses vote counts from NBC News to demonstrat...
The post addresses a viral conspiracy theory claiming that Starlink is rigging votes in elections. The author debunks these claims, stating they are incoherent and lack evidence. The text explains how technology, specifically rout...
The post discusses claims of 2020 election fraud related to voting machines, emphasizing that while experts acknowledge the potential for hacking, they find no evidence that such incidents occurred. It highlights a letter from res...
The post critiques the New York Times' coverage of the recent Louvre jewel heist, arguing that it prioritizes quotes from celebrities like George Clooney over insights from technical experts. It highlights the complexities of muse...
The post discusses the bravery of Katie Moussouris in supporting Chris Krebs, the former head of CISA, who faces retribution from Trump for defending the integrity of the 2020 election. It highlights the risks faced by those in cy...
The post discusses the historical context and current issues surrounding Social Security Numbers (SSNs) in the U.S., particularly in response to Elon Musk's comments on their uniqueness. It explains that SSNs were not originally d...
The author argues against the notion that the US power grid is at significant risk from hackers, emphasizing its diversity and resilience. Instead, the focus should be on local blackouts caused by hackers. The post critiques the i...
Pavel Durov, CEO of Telegram, was arrested in France for alleged complicity in crimes associated with the platform, including drug trafficking and money laundering. The post discusses the commonality of tech executives being arres...
The dissolution of the Cyber Safety Revue Board (CSRB) is viewed positively as it was seen as a misuse of resources. Unlike the NTSB, which is a federal agency with technical experts and a substantial budget, the CSRB consisted of...