Other Posts

Removing the RSA Security 1024 V3 Root

There’s been confusion today about the work we’re doing on our root store, the set of trusted certificate authorities shipped with Mozilla products. The short story is this: we’re removing the “RSA Security 1024 V3″ root from that list. Its owners have confirmed that it is not in use, and not covered by current audits. We regularly check for roots […]

April 6, 2010 · 0 comments · security

Enforcement of the GNU GPL in Germany and Europe

A. Rationale for enforcement of the GPL – At present, the enforcement of the GPL license conditions is driven by single developers and organizations supporting Free Software. Most famous is Mr. Harald Welte, former maintainer of the Netfilter/Iptables project, who is running the enforcement project gpl-violations.org. Some years ago, Mr. Welte became aware of the fact that many manufacturers use […]

April 3, 2010 · 0 comments · privacy and licensing
Opening up the MeeGo development

Opening up the MeeGo development

Today is the culmination of a huge effort by the worldwide Nokia and Intel teams to share the MeeGo operating system code with the open source community. This is the latest step in the full merger of Maemo and Moblin, and we are happy to open the repositories and move the ongoing development work into the open – as we […]

April 1, 2010 · 0 comments · MeeGo
Google Squeezes Flash into Chrome

Google Squeezes Flash into Chrome

Adobe’s Flash Player has come under fire from developers and companies who question its necessity, but the plug-in has just received a big vote of confidence from Google. This week, Google announced that its Chrome browser will come with Flash built in. And Google, Adobe, and another browser maker, Mozilla, have revealed plans to improve the way plug-ins interface with […]

April 1, 2010 · 0 comments · browsers
How Android Security Stacks Up

How Android Security Stacks Up

Today’s smart phones have all the speed, storage, and network connectivity of desktop computers from a few years ago. Because of this, they’re a treasure trove of personal information–and likely the next battleground for computer security. What makes smart phones attractive–the ability to customize them by downloading applications–is what makes them dangerous. Apps make the mobile phone a real computer, […]

April 1, 2010 · 0 comments · android, security

A Comfortable and Secure Login Method

As most Internet users know, it is often hard to remember or keep apart all the passwords and login names for one’s different online accounts. Dr. Bernd Borchert, together with students at the Computer Science Department of Tübingen University, has tackled this issue. They developed a new method that saves the users not only the trouble of memorizing the passwords […]

March 31, 2010 · 0 comments · security