Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Open List of Requested iOS Security Improvements (2016) (zdziarski.com)
1 point by walterbell on March 21, 2018 | past
Counter-Forensics: Pair-Lock Your Device with Apple’s Configurator (zdziarski.com)
1 point by MaysonL on Feb 28, 2018 | past
Counter-Forensics: Pair-Lock Your Device with Apple’s Configurator (zdziarski.com)
2 points by tony101 on April 5, 2017 | past
Jonathan Zdziarski joins Apple (zdziarski.com)
4 points by mpweiher on March 15, 2017 | past | 1 comment
Joining Apple (Jonathan Zdziarski) (zdziarski.com)
7 points by glhaynes on March 14, 2017 | past
Protecting Your Data at a Border Crossing (zdziarski.com)
3 points by daviday on Feb 23, 2017 | past
Protecting Your Data at a Border Crossing (zdziarski.com)
1 point by spaceboy on Feb 15, 2017 | past
Protecting Your Data at a Border Crossing (zdziarski.com)
4 points by prawn on Feb 13, 2017 | past
Protecting Your Data at a Border Crossing (zdziarski.com)
13 points by colinprince on Feb 11, 2017 | past | 1 comment
Fingerprint Reader / PIN Bypass for Enterprises Built into iOS 7 (zdziarski.com)
1 point by mikecarlton on Feb 10, 2017 | past
Counter-Forensics: Pair-Lock Your Device with Apple’s Configurator (zdziarski.com)
2 points by mikecarlton on Feb 10, 2017 | past
Configuring the Touch Bar in OS X for System Lockdown (zdziarski.com)
3 points by kozmico on Jan 19, 2017 | past
Three Recommendations to Harden iOS Against Jailbreaks and Malware (zdziarski.com)
1 point by walterbell on Dec 23, 2016 | past
Three Recommendations to Harden iOS Against Jailbreaks and Malware (zdziarski.com)
2 points by balderdash on Dec 22, 2016 | past
San Bernardino: Behind the Scenes (zdziarski.com)
12 points by balderdash on Nov 7, 2016 | past | 2 comments
Can We Put the 16GB “Pro” Myth to Rest? (zdziarski.com)
32 points by imwally on Nov 4, 2016 | past | 29 comments
On the State of Open Source (zdziarski.com)
4 points by Snocrash on Oct 4, 2016 | past
On the state of Open Source (zdziarski.com)
2 points by meira on Oct 3, 2016 | past
Little Flocker: Ransomware and Spyware Protection via File Access Enforcement (zdziarski.com)
4 points by po on Sept 13, 2016 | past
Little Flocker for Mac: Protection Through File Access Enforcement (zdziarski.com)
2 points by milen on Sept 6, 2016 | past
Introducing Little Flocker: File Access Enforcement for MacOS (zdziarski.com)
13 points by jzdziarski on Aug 22, 2016 | past | 2 comments
Little Flocker: Ransomware and Spyware Protection via File Access Enforcement (zdziarski.com)
2 points by DanRubins on Aug 21, 2016 | past
FlockFlock – Ransomware and Spyware Protection Through File Access Enforcement (zdziarski.com)
1 point by designorant on Aug 4, 2016 | past
Introducing FlockFlock: File Access Enforcement for MacOS (zdziarski.com)
2 points by balderdash on Aug 3, 2016 | past
WhatsApp Forensic Artifacts: Chats Aren’t Being Deleted (zdziarski.com)
24 points by uptown on July 29, 2016 | past | 4 comments
WhatsApp Forensic Artifacts: Chats Aren’t Being Deleted (zdziarski.com)
5 points by walterbell on July 29, 2016 | past
The Dangers of the Burr Encryption Bill (zdziarski.com)
1 point by Hoff on April 13, 2016 | past
The Dangers of the Burr Encryption Bill (zdziarski.com)
4 points by doener on April 11, 2016 | past
How Apple Can Make Their FBI Problems Go Away (zdziarski.com)
2 points by xoa on April 1, 2016 | past | 3 comments
How App Store Apps Are Hacked on Non-Jailbroken Phones (2014) (zdziarski.com)
2 points by chatmasta on March 28, 2016 | past

Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: