Studying for an IT LLM

Having just graduated with a Master of Laws (LLM) in Information Technology Law, I thought it would be apt to share more about how I came to the decision to study for the LLM and the journey taken over the past 2 years. Why Study for an LLM? Having been in the workforce for about 8 years prior, ...

Tuya Local and Protocol 3.5 support

I have been a longtime user of localtuya and tried to configure a recently purchased triple USB tuya plug that looks like that below. localtuya has been suggested by most of the tutorials online and is one of the most popular add-ons. The device name showing up on the SmartLife app is 3CH Wifi ...

When does Windows sleep?

I have always wondered about a somewhat inconsistent behaviour in how Windows decides when the computer is inactive, and to turn off the screen and subsequently sleep. As an example, if I have a 2 hour YouTube video playing in the browser, the screen will never turn off and the computer will ...

Integrating Kasm with MS Azure Internal OIDC

Recently, I faced issues integrating Kasm with Microsoft Azure Internal OIDC due to outdated documentation. After some trial and error, I got it to work. Here's the list of inaccuracies in the documentation. Step 17 is no longer required. sid will be automatically included in the token. You ...

Export Controls on Software

In the context of software, export control has a fairly encompassing definition and restricts the "disclosure of source code to foreign nationals", even if the disclosure occurs domestically, even if no money changes hands, and also if the distribution occurs over the Internet [1], the ...

Territoriality: Internet Crime

I do believe that Barlow's statement still holds some weight today and that states "are not welcome" in cyberspace [1]. In cyberspace, it is companies that jealously guard their jurisdiction and sovereignty as they battle for market share, user retention, all the while collecting massive troves ...

Volume of Digital Evidence

Doctorow states that the most important commodity in today's economy is attention [1]. Each person only has 24 hours in a day to send messages, surf the net, watch video and shop online. Hence, even though the size of hard drives has increased 100 fold from 10GB in 1999 to 1TB in 2013 [2], we ...

Centralization of Digital Evidence

Internet traffic today is highly asymmetric. The top 5 social media sites account for 99% market share of global social media traffic [1]. Crimes ranging from blackmail to phishing scams to bomb threats are largely occurring on the same few social messaging apps and social network sites. Most ...