« earlier | later » Page 2 of 11
Trammell Hudson's Projects edit / delete
Lots of interesting electronics, security and retrocomputing projects; in particular, PDP-11 restoration and interesting USB input devices.
to electronics retrocomputing reverse-engineering security usb ... on 26 February 2017
The history of twentieth-century Scottish safecracking. (The author is skeptical about John Ramensky's exploits.)
to crime folk-song history ramensky scotland security ... on 11 January 2017
Mid-2016 Tor bug retrospective, with lessons for future coding | The Tor Blog edit / delete
"I recently did an informal review of our major bugs from the last few years. ... My goals were to see if we're right in our understanding of what causes bugs in Tor, and what approaches to avoid bugs and limit their impact would be most effective."
to bug security software-engineering tor ... on 06 December 2016
"though I would consider the requirements for writing really secure software qui... | Hacker News edit / delete
Links to some projects doing secure software engineering in practice.
to security software-engineering ... on 06 December 2016
stealth/pam_schroedinger: Uncertainty for brute forcers during login. edit / delete
"pam_schroedinger prevents from dicitionary/brute-force attacks against PAM accounts by only returning PAM_SUCCESS if there was no previous login or attempt within a certain timeframe." Cute. Not sure how practical this is!
to authentication pam security ... on 18 October 2016
List of Bug Bounty Programs INTERNATIONAL 477+ OFFICIAL - Bug Bounty Sheet VULNERABILITY LAB edit / delete
As it says.
to bounty bug ethical-hacking security vulnerability ... on 18 October 2016
netsniff-ng toolkit edit / delete
Various low-level packet tools -- I found this while looking for tunnelling systems based on NaCl.
to crypto ecc nacl networking packet security tunnel ... on 18 October 2016
The Cryptopals Crypto Challenges edit / delete
"We give you problems to solve. They're derived from weaknesses in real-world systems and modern cryptographic constructions. We give you enough info to learn about the underlying crypto concepts yourself." These are really good.
Perspectives Project | Connect securely to https websites – Blog and info for the Perspectives project edit / delete
Certificate notary service -- the idea being both to detect forged (but valid) certificates, and to provide trust in self-signed certs.
to ca certificate notary security tls ... on 14 October 2016
Capsicum Implementation Status edit / delete
I keep thinking "wouldn't it be nice if someone did capability-based security in Unix userspace" and then forgetting that this project already exists...
to capability capsicum security unix ... on 14 October 2016
« earlier | later » Page 2 of 11
tasty by Adam Sampson.