security.internetarchaeology.io
Open in
urlscan Pro
162.159.152.4
Public Scan
Submitted URL: https://security.internetarchaeology.io/
Effective URL: https://security.internetarchaeology.io/?gi=17f275d5da63
Submission: On March 01 via api from US — Scanned from US
Effective URL: https://security.internetarchaeology.io/?gi=17f275d5da63
Submission: On March 01 via api from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
Open in app Sign up Sign in Write Sign up Sign in Ruining All Your Branding 15 Followers Follow Home About Published in Infoseconds ·5 hours ago Member-only THE TALE OF THE SMART LOCK THAT DOESN’T ACTUALLY LOCK ANYTHING Don’t advertise that your product is ‘secure’. It never ends well. — Don’t advertise that anything is ‘secure’. It never ends well. In fact, nothing is secure. Nothing stays secure forever. Any lock safeguards personal possessions and within that inherent trust, advertising and smart technologies should provide the average end user robust security controls as said user likely envisions. On March 27th… Security 6 min read Security 6 min read -------------------------------------------------------------------------------- Published in Infoseconds ·3 days ago Member-only FULL ARTICLE LIST BY PUBLICATION It seems like there is an opportunity lost for readers to view older articles with the way articles are now curated, and viewed via the Medium Interface, so below is a full article list of public posts per publication. — Here is the full list for Infoseconds as it stands today. Please clap and share! Don’t forget to clap, subscribe, or become a member! If you’re feeling generous, leave me a tip! If you’re curious about sources, on a separate page because long citations tank my stats! Technology 3 min read Technology 3 min read -------------------------------------------------------------------------------- Published in Infoseconds ·3 days ago Member-only MY BIBLIOGRAPHIES ARE WRECKING MY MEDIUM ARTICLE STATS Splitting many blogs across two different users as many are growing too large. Here is the Infoseconds and Investigation Bilbiography should it be applicable. — Citations Like this story? Check out a list of all articles. Don’t forget to clap, subscribe, or become a member! If you’re feeling generous, leave me a tip! Be sure to also check out my other publications here. Supply Chain Attacks are Congruent with Corporate Espionage Cybersecurity 10 min read Cybersecurity 10 min read -------------------------------------------------------------------------------- Published in Infoseconds ·3 days ago Member-only INFOSECONDS IS MOVING (TO A NEW URL) Splitting my blogs because they are all growing… — Tech 1 min read Tech 1 min read RUINING ALL YOUR BRANDING 15 Followers Kicking all your @ since 1337. Detective, Cyber Security Professional, Writer. Follow Following * Sufi Bilal Butt * Adam, The Diabetic Cyborg * Sania Haroon * MD White * Solomon banda See all (438) Help Status About Careers Blog Privacy Terms Text to speech Teams