Each device has it's own unique chip that is used to derive the encryption key used for the data on the device. Without that, no dice on decryption.

Marketing Hype and Security Technology That Actually Works [phoneboy.org]
There have been a few videos produced that show various ways to bypass Palo Alto Networks firewalls. Disclaimer: The views herein are my own.

Marketing Hype and Security Technology That Actually Works [phoneboy.org]
There have been a few videos produced that show various ways to bypass Palo Alto Networks firewalls. Disclaimer: The views herein are my own.

Shouldn't a Security Gateway Be Secure By Default? [phoneboy.org]
From Palo Alto Networks: Best Practices for Securing Your Network from Layer 4 and Layer 7 Evasions: Block all unknown applications/traffic using security policy. My guess: probably not. Disclaimer:

Now on Github Pages, New RSS Feed Location [phoneboy.org]
For various reasons I decided to move the hosting of this blog to Github Pages. I now have a nice, spiffy new site theme as well. Not that too many people care about that stuff.

The Start of my Information Security Career 20 Years Ago [phoneboy.org]
Update: For those who like to listen to audio instead of read, I recorded a version of this story in podcast form. Back then there was just the guys who ran the servers. Qualix Group. The bottom lin…

The Security Impediment [phoneboy.org]
From Chip Cards Take So Long, Some Retailers Disabled Them For The Holidays: It could be that, among other things, retailers are reacting to shoppers’ sentiments. This can happen because:

Palo Alto Networks Is Evading The Truth [phoneboy.org]
Here’s a summary from A Letter to Palo Alto Networks Employees and Customers: The issue is a little more nuanced than this of course, so I recommend reading the piece by Moti Sagey on LinkedIn.

Cybersecurity: Protection From an Existential Threat [phoneboy.org]
From Cybercrime poses a potential existential threat to our society, and we’re completely unprepared: Existential meaning “of or relating to existence.” It’s a pretty bold statement. Cybersecurity:

Bridging The Information Security Gap [phoneboy.org]
You may have noticed a marked increase in the amount of posts I’ve done to this blog lately. Whether you read these ports or not, all these new posts aren’t necessarily an accident. What is it?