-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
170 lines (132 loc) · 9.51 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<title>J.M. Porup by toholdaquill</title>
<link rel="stylesheet" href="stylesheets/styles.css">
<link rel="stylesheet" href="stylesheets/github-light.css">
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no">
</head>
<body>
<div class="wrapper">
<header>
<h1>J.M. Porup</h1>
<p>to hold a quill is to be at war.<BR>—Voltaire</p>
<p class="view"><a href="https://www.twitter.com/toholdaquill">@toholdaquill</a></p>
</header>
<section>
<p>
J.M. Porup is a cybersecurity && national security reporter.
</p>
<p>
He has covered wrongdoing at the <a href="http://arstechnica.co.uk/security/2016/02/the-nsas-skynet-program-may-be-killing-thousands-of-innocent-people/">NSA</a>, <a href="http://arstechnica.co.uk/security/2016/04/uk-secret-police-surveillance-bulk-personal-datasets/">GCHQ</a>, <a href="http://www.cbc.ca/beta/news/technology/security-flaws-cyberweapons-1.3742751">CSE</a>, and <a href="http://arstechnica.co.uk/security/2016/02/european-spy-tech-sold-to-secret-branch-of-egyptian-intelligence-claims-new-report/">elsewhere</a>. His work has appeared in <em>Ars Technica,</em> <em>The Christian Science Monitor,</em> <em>Slate,</em> <em>Motherboard,</em> <em>The Daily Dot,</em> <em>The Kernel,</em> <em>The Economist,</em> <em>CyberScoop,</em> the CBC, and <em>CSO Online.</em>
</p>
<p>
A programmer and sysadmin turned journalist, Porup holds a Master of Information and Cybersecurity (MICS) from the UC Berkeley iSchool. He lives in New York.
</p>
<p>
He prototyped new security tools as part of the <a href="https://cyber.harvard.edu/node/99717">Berkman Klein Assembly 2017</a> security incubator at the <a href="https://cyber.harvard.edu/">Berkman Klein Center for Internet & Society</a> at Harvard University. While at Berkeley he also worked as a public interest technologist defending an international NGO with nation-state adversaries as part of the CLTC's <a href="https://cltc.berkeley.edu/about-us/citizen-clinic/">Citizen Clinic.</a>
</p>
<p>
In a former life, he worked for many years as a F/LOSS programmer in Melbourne, Australia. As a reporter with a solid background in computer science, he brings a depth of technical understanding to his reporting that few journalists possess.
</p>
<p>
He reported from Latin America for a long time. From his base in Cali, Colombia, he co-authored Lonely Planet guidebooks to Venezuela, the Dominican Republic & Haiti, South America on a Shoestring, and the Caribbean Islands. He was the Co-ordinating Author of <em>Lonely Planet Colombia, 5th ed.</em> He speaks Spanish fluently with a hilarious gringo-Colombian accent.
</p>
<p>
Porup is also a comedian who has trained and performed at Second City, UCB, Magnet, The PIT, and with clown teachers on both sides of the Atlantic, including Philippe Gaulier.
</p>
<p>Some recent work:</p>
<p>
<a href="https://www.csoonline.com/article/3535888/bug-bounty-platforms-buy-researcher-silence-violate-labor-laws-critics-say.html">Investigation: Bug bounty platforms buy researcher silence to cover up security vulnerabilities</a> CSO Online, April 2, 2020
</p>
<p>
<a href="https://www.csoonline.com/article/3386381/inside-the-2014-hack-of-a-saudi-embassy.html">"ISIS" hacks Saudi embassy, demands $50 million — or else</a> CSO Online, April 8, 2019
</p>
<p>
<a href="https://www.csoonline.com/article/3326501/security-awareness/fear-and-loathing-defending-ics-security-at-does-cyberforce-competition.html">Fear and Loathing in the Cyber Force: going gonzo to defend critical infrastructure</a> CSO Online, December 17, 2018
</p>
<p>
<a href="https://www.csoonline.com/article/3267625/security/want-to-hack-a-voting-machine-hack-the-voting-machine-vendor-first.html">Want to hack a voting machine? Hack the voting machine vendor first</a> CSO Online, March 28, 2018
</p>
<p>
<a href="http://arstechnica.co.uk/security/2016/02/the-nsas-skynet-program-may-be-killing-thousands-of-innocent-people/">The NSA’s SKYNET program may be killing thousands of innocent people</a> Ars Technica UK, February 16, 2016
</p>
<p>
<a href="https://arstechnica.co.uk/information-technology/2017/04/hunting-for-mexicos-mass-graves-with-machine-learning/">Hunting for Mexico’s mass graves with machine learning: As many as 300,000 victims of Mexico's drug war could be hidden in <em>fosas clandestinas.</em></a> Ars Technica UK, April 17, 2017
</p>
<p>
<a href="https://arstechnica.co.uk/information-technology/2017/02/future-of-the-www-timbl-drm/">A battle rages for the future of the Web: Should the WWW be locked down with DRM? Tim Berners-Lee needs to decide</a> Ars Technica UK, February 13, 2017
</p>
<p>
<a href="https://www.cyberscoop.com/chainiac-software-backdoor-mandates-nsa-gchq/">New tool can help prevent government-mandated backdoors in software, Swiss researchers say</a> CyberScoop, July 25, 2017
</p>
<p>
<a href="http://www.cbc.ca/beta/news/technology/security-flaws-cyberweapons-1.3742751">Turning security flaws into cyberweapons endangers Canadians, experts warn</a> CBC, September 2, 2016
</p>
<p>
<a href="http://arstechnica.co.uk/security/2016/04/uk-secret-police-surveillance-bulk-personal-datasets/">UK secret police are indiscriminately spying on millions of innocent people</a> Ars Technica UK, April 20, 2016
</p>
<p>
<a href="http://arstechnica.co.uk/security/2016/08/building-a-new-tor-that-withstands-next-generation-state-surveillance/">Without anonymity, democracy crumbles: Building a new Tor that can resist next-generation state surveillance</a> Ars Technica UK, August 31, 2016
</p>
<p>
<a href="http://arstechnica.co.uk/security/2016/05/robin-hood-hacker-rojava-syria-bitcoin-donation/">Hacking Team hacker steals €10K in Bitcoin, sends it to Kurdish anticapitalists in Rojava</a> Ars Technica UK, May 18, 2016
</p>
<p>
<a href="http://arstechnica.co.uk/security/2016/09/linux-kernel-security-needs-fixing/">The Linux kernel's Ralph Nader moment</a> Ars Technica UK, September 27, 2016
</p>
<p>
<a href="http://arstechnica.co.uk/security/2016/07/cissp-certification-how-to-hire-infosec-pros/">CISSP certification: Are multiple choice tests the best way to hire infosec pros?</a> Ars Technica UK, July 4, 2016
</p>
<p>
<a href="http://arstechnica.com/security/2016/01/how-to-search-the-internet-of-things-for-photos-of-sleeping-babies/">“Internet of Things” security is hilariously broken and getting worse</a> Ars Technica, January 23, 2016
</p>
<p>
<a href="http://arstechnica.com/security/2016/03/cothority-to-apple-lets-make-secret-backdoors-impossible/">Cothority to Apple: Let’s make secret backdoors impossible</a> Ars Technica, March 10, 2016
</p>
<p>
<a href="http://arstechnica.com/security/2016/04/underwriters-labs-refuses-to-share-new-iot-cybersecurity-standard/">Underwriters Labs refuses to share new IoT cybersecurity standard</a> Ars Technica, April 13, 2016
</p>
<p>
<a href="http://arstechnica.com/tech-policy/2016/03/uk-cops-tell-suspect-to-hand-over-crypto-keys-in-us-hacking-case/">British police, in witch hunt, demand suspect turn over encryption keys—for the second time</a> Ars Technica, March 31, 2016
</p>
<p>
<a href="http://arstechnica.co.uk/security/2016/02/european-spy-tech-sold-to-secret-branch-of-egyptian-intelligence-claims-new-report/">European spy tech sold to ultra-secret branch of Egyptian gov’t, claims new report</a> Ars Technica UK, February 25, 2016
</p>
<p>
<a href="http://www.slate.com/articles/technology/future_tense/2016/01/malware_not_malicious_hackers_is_the_biggest_danger_to_internet_connected.html">Malware in the hospital</a> Slate, January 25, 2016
</p>
<p>
<a href="http://www.csmonitor.com/World/Passcode/2016/0210/FDA-presses-medical-device-makers-to-OK-good-faith-hacking">FDA presses medical device makers to OK good faith hacking</a> The Christian Science Monitor, February 10, 2016
</p>
<p>
<a href="http://motherboard.vice.com/read/ransomware-is-coming-to-medical-devices">Ransomware is coming to medical devices</a> Motherboard, November, 2015
</p>
<p>
<a href="http://motherboard.vice.com/read/why-arent-there-better-cybersecurity-regulations-for-medical-devices">Why aren’t there better cybersecurity regulations for medical devices?</a> Motherboard, October, 2015
</p>
<p>
<a href="http://motherboard.vice.com/read/dissent-a-new-type-of-security-tool-could-markedly-improve-online-anonymity">‘Dissent,’ a new type of security tool, could markedly improve online anonymity</a> Motherboard, September, 2015
</p>
<p>
<a href="http://motherboard.vice.com/read/this-new-secure-app-for-journalists-may-not-be-secure-at-all">This new ‘secure’ app for journalists may not be secure at all</a> Motherboard, October, 2015
</p>
<p>
<a href="http://motherboard.vice.com/read/reverse-engineering-proves-journalist-security-app-unsafe">Reverse engineering proves journalist security app is anything but secure</a> Motherboard, October, 2015
</p>
<p>
<a href="http://motherboard.vice.com/read/how-debian-is-trying-to-shut-down-the-cia-and-make-software-trustworthy-again">Debian Reproducible Builds</a> Motherboard, September, 2015
</p>
<p>
<a href="http://www.economist.com/blogs/babbage/2014/03/computer-security">Qubes: A Digital Fortress?</a> The Economist, March, 2014
</p>
<p>
<a href="https://www.economist.com/schumpeter/2013/12/26/bitcoin-paradise">Bitcoin Paradise?</a> The Economist, December 26, 2013
</p>
</section>
</div>
<script src="javascripts/scale.fix.js"></script>
</body>
</html>