
Ep 8: Durable Security and Privacy-enhanced Computing with Dr. Todd Austin, University of Michigan
Computer Architecture Podcast
00:00
How to Get the Most Out of Your Security Numbers
Jm, jim laris: We have a heavy reliance on sofrnow for everything. And what you've just kind of described there is enabling any soffer anywhere to do its thing. The whole inner net is built on this idea that i give you my data, you monotize my data and provide me as free service for that data. Half of us had oursecurity numbers stolen in a single breach in 20 17,. the equifax breach, which was a runon runtime coation standard - 76 days they were able to exciltrate data from that. I read a very interesting statistic the other day. What fraction of american adults have had their s security numbers
Play episode from 15:52
Transcript


