The supply chain is complicated – which is why it is vulnerable to exploitation

Bruse Schneier has an interesting article out today, describing how a Russian company that produces code that is included in thousands of smartphone apps, both iOS and Android, masquerades as an US company. Russian Software Company Pretending to Be American – Schneier on Security There is no suggestion of wrong …

Data Sovereignty – who can access what and where. UPDATED

data

The original post was published on 3 November 2022. Update 16 November 2022 This story has developed further with FBI Director Christopher A. Wray describing to the US Congress how China could exploit Tik Tok: FBI Director warns of potential Chinese gov’t exploitation of TikTok – The Record by Recorded …