C3TV - Cyber Necromancy edit / delete

The 31C3 presentation on reverse-engineering Metal Gear Online. You need to watch the video for this one.

to ag0907 ccc games mgo networking p2p reverse-engineering security ... on 18 January 2015

C3TV - Crypto Tales from the Trenches edit / delete

A group of journalists talk about how cryptography is useful to them -- and why it's a royal pain to use for the people they talk to. It's very encouraging to hear about the tools they use.

to ccc cryptography gpg journalism security tor whistleblowing ... on 18 January 2015

C3TV - Hacking Ethics in Education edit / delete

"At the University of Amsterdam, we have started an ethical committee for the System and Network Engineering Master." Interesting to me because I run the ethics committee for the department I'm in at work (and we're about to pick up a load of security-related student projects). I suspect a follow-up presentation next year might be more interesting, though, since it sounds like they didn't have any ethics framework in place before (?! -- how on earth do they do funded projects?). Comprehensible in audio only.

to academia ccc ethics security teaching ... on 18 January 2015

Why King George III Can Encrypt edit / delete

Coming up with better metaphors for how PGP signing and encryption works, and then *actually evaluating how effective they are with users*. The short answer: key/lock, seal/imprint. And tell a story about them.

to cryptography encryption gpg metaphors papers pgp security teaching ... on 18 January 2015

[SaveMGO] Tactical Revival Action edit / delete

Reverse-engineering the server for Metal Gear Online 1/2 -- there was an excellent presentation about this at 31C3 that explained how they did it. It's a peer-to-peer game, so the server actually isn't too complicated. AG0907 students will probably find it interesting to see what a real-world matchmaking protocol looks like.

to ag0907 games mgo networking p2p reverse-engineering security ... on 18 January 2015

KeySweeper edit / delete

"KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any Microsoft wireless keyboard in the vicinity." So that's three reasons why I won't be buying a Microsoft wireless keyboard, then.

to arduino keyboard keylogger microcontroller security wireless ... on 18 January 2015

0xd6.org edit / delete

Marcus R. Brown's site on PS2 homebrew, now defunct, but with some useful information: how to add a serial port, how to patch the Linux abstraction layer so you can use the whole of a memory card, and the details of the "Independence Exploit" (using a buffer overflow in the PS1 emulator) that used to be used for homebrew. Reading between the lines here you can see how he came up with the exploit too...

to homebrew linux playstation ps2 security ... on 18 January 2015

Vulnerability: Infiltrating a network via Powerline (HomePlugAV) adapters - www.bentasker.co.uk edit / delete

Attacking HomePlugAV devices (not all of them, but a large subset). It's a key distribution problem.

to crypto homeplugav networking security ... on 18 January 2015

17 Mistakes Microsoft Made in the Xbox Security System - Xbox-Linux edit / delete

How the (original) Xbox's freedom-denying bootloader was meant to work, and how it was broken. Repeatedly.

to cryptography reverse-engineering security xbox ... on 06 January 2015

Language-theoretic Security edit / delete

"The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks." Some interesting work, although it's obviously focussing on one class of problem...

to langsec language-design parser proof security verification ... on 03 January 2015

Browser bookmarks: tasty+ | tasty= Log in | Export | Atom

Tags related to security

- security
 
1 + academia
1 + access-control
1 + acme
1 + ag0700
1 + ag0803
2 + ag0907
6 + amusements
2 + api
1 + architecture
1 + arduino
3 + arm
1 + authentication
1 + autoconf
1 + avr
1 + backdoor
1 + bell-labs
1 + bitcoin
1 + blockchain
1 + bounds-checking
1 + bounty
1 + browser
2 + buffer
2 + buffer-overflow
2 + bug
2 + bugs
1 + build-systems
2 + c
2 + c++
4 + ca
1 + camera
1 + capability
1 + capsicum
4 + ccc
4 + certificate
1 + certificates
1 + cesrg
1 + checking
1 + chromium
1 + chroot
1 + clang
1 + cloud
1 + code
3 + compiler
1 + conference
2 + container
1 + coop
1 + coverage
1 + coverage-directed
1 + coverity
2 + cpu
1 + crime
10 + crypto
12 + cryptography
1 + cs
1 + cypherpunks
1 + debian
1 + debugging
1 + dect
1 + design
1 + dh
2 + djb
1 + ebooks
1 + ecc
1 + economics
1 + el0805
1 + elective
3 + electronics
3 + encryption
2 + ers
1 + ethereum
1 + ethical-hacking
1 + ethics
3 + exploit
1 + firefox
1 + folk-song
4 + formal-methods
1 + freedom
3 + fuzzing
2 + gameboy
5 + games
1 + gcc
1 + git
1 + goto
2 + gpg
1 + gsm
2 + hardening
5 + history
1 + homebrew
1 + homeplugav
1 + http
1 + https
1 + intel
1 + ip
1 + ipsec
1 + javascript
1 + journalism
1 + jquery
1 + kerberos
3 + kernel
1 + keyboard
1 + keylogger
1 + langsec
2 + language-design
1 + letsencrypt
1 + library
1 + licensing
12 + linux
1 + livecd
1 + lts
1 + luks
1 + lvm
1 + mac
1 + memory-safety
1 + metaphors
2 + mgo
1 + microcode
4 + microcontroller
1 + mmc
1 + mod-ers
1 + monitoring
3 + nacl
5 + network
6 + networking
1 + noise
1 + notary
1 + ocaml
1 + openssh
2 + openssl
1 + org
2 + os
2 + overflow
2 + p2p
1 + packet
1 + pam
2 + papers
1 + parser
1 + password
1 + patterns
1 + pgp
2 + philosophy
2 + phone
1 + phreaking
1 + pki
1 + playstation
1 + podcasts
2 + politics
1 + porting
1 + prime
2 + privacy
1 + privilege-separation
4 + programming
1 + proof
1 + ps2
2 + python
1 + radio
1 + ramensky
1 + random
1 + research
3 + retrocomputing
1 + retrotech
6 + reverse-engineering
1 + risc
1 + rop
1 + safe
2 + safety
4 + sandbox
1 + scanner
1 + scm
1 + scotland
1 + sd
1 + search
2 + seccomp
1 + shuffle
1 + sni
1 + snowden
14 + software
6 + software-engineering
3 + ssh
12 + ssl
4 + static-analysis
1 + stoll
1 + strategy
1 + support
1 + syscall
1 + systems
1 + tandy
1 + tcp
1 + tea
6 + teaching
1 + telecom
5 + testing
14 + tls
2 + tor
1 + tunnel
4 + unix
1 + usability
1 + usable-security
2 + usb
1 + validation
1 + varan
3 + verification
1 + video
1 + vlc
1 + vpn
1 + vulnerabilities
1 + vulnerability
3 + web
1 + webcam
1 + whistleblowing
2 + wireless
1 + wpa
1 + writing
1 + x86
1 + xbox