Recognizing the Gray Areas in Security

Since technology can be used by the good and bad guys, there is always a fine line that separates the two. For example, BitTorrent is a peer-to-peer file sharing protocol that al- lows individuals all over the world to share files whether they are the legal owners or not. One website will have the metadata … Read more