security.internetarchaeology.io Open in urlscan Pro
162.159.152.4  Public Scan

Submitted URL: https://security.internetarchaeology.io/
Effective URL: https://security.internetarchaeology.io/?gi=17f275d5da63
Submission: On March 01 via api from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

Open in app

Sign up

Sign in

Write


Sign up

Sign in


Ruining All Your Branding

15 Followers

Follow


Home

About




Published in

Infoseconds



·5 hours ago

Member-only


THE TALE OF THE SMART LOCK THAT DOESN’T ACTUALLY LOCK ANYTHING

Don’t advertise that your product is ‘secure’. It never ends well. — Don’t
advertise that anything is ‘secure’. It never ends well. In fact, nothing is
secure. Nothing stays secure forever. Any lock safeguards personal possessions
and within that inherent trust, advertising and smart technologies should
provide the average end user robust security controls as said user likely
envisions. On March 27th…

Security

6 min read



Security

6 min read





--------------------------------------------------------------------------------

Published in

Infoseconds



·3 days ago

Member-only


FULL ARTICLE LIST BY PUBLICATION

It seems like there is an opportunity lost for readers to view older articles
with the way articles are now curated, and viewed via the Medium Interface, so
below is a full article list of public posts per publication. — Here is the full
list for Infoseconds as it stands today. Please clap and share! Don’t forget to
clap, subscribe, or become a member! If you’re feeling generous, leave me a tip!
If you’re curious about sources, on a separate page because long citations tank
my stats!

Technology

3 min read



Technology

3 min read





--------------------------------------------------------------------------------

Published in

Infoseconds



·3 days ago

Member-only


MY BIBLIOGRAPHIES ARE WRECKING MY MEDIUM ARTICLE STATS

Splitting many blogs across two different users as many are growing too large.
Here is the Infoseconds and Investigation Bilbiography should it be applicable.
— Citations Like this story? Check out a list of all articles. Don’t forget to
clap, subscribe, or become a member! If you’re feeling generous, leave me a tip!
Be sure to also check out my other publications here. Supply Chain Attacks are
Congruent with Corporate Espionage

Cybersecurity

10 min read



Cybersecurity

10 min read





--------------------------------------------------------------------------------

Published in

Infoseconds



·3 days ago

Member-only


INFOSECONDS IS MOVING (TO A NEW URL)

Splitting my blogs because they are all growing… —

Tech

1 min read



Tech

1 min read






RUINING ALL YOUR BRANDING

15 Followers

Kicking all your @ since 1337. Detective, Cyber Security Professional, Writer.

Follow

Following

 * Sufi Bilal Butt
   
   

 * Adam, The Diabetic Cyborg
   
   

 * Sania Haroon
   
   

 * MD White
   
   

 * Solomon banda
   
   

See all (438)



Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams