More GhostPosterDate: 2026-01-20 | Length: 2.25 hrs
Your name and email are stored only in your browser local storage for convenience. They are not retained server-side.
According to the Security Now! episode transcript, what specific technique did the GhostPoster malicious browser extensions use to evade traditional security detection in Firefox, Edge, and Chrome?
What is the primary operational drawback of the approach taken by ANCHOR compared to the original CIPAC for industry-government cyber threat information sharing, as discussed in the episode?
Based on the episode's discussion, why does Steve Gibson disagree with the Electronic Freedom Foundation's (EFF) absolutist stance on encryption privacy in light of intelligence agency capabilities?
What security improvement is enabled by the newly available six-day Let’s Encrypt certificates, according to the podcast?
Regarding the GhostPoster campaign’s infection timeline, which of the following best describes the progression and current scope as revealed in the episode?
Submit Quiz Cancel