« earlier | later » Page 8 of 11
Eben Moglen: Snowden and the Future edit / delete
Eben Moglen is very angry.
to freedom politics security snowden ... on 15 December 2013
About Crossbear | pki.net.in.tum.de|crossbear.org edit / delete
"Crossbear is a tool that aims to detect and localise Man-in-the-middle (MitM) attacks on the SSL/TLS [and SSH] protocols." It works by comparing the certificate you get with what others got from different locations. (I imagine CDNs will break this as usual...)
to ca certificate security ssh ssl tls ... on 14 December 2013
The big GSM write-up – how to capture, analyze and crack GSM? – 1. | Going on my way… edit / delete
A four-part series.
to crypto gsm monitoring phone security ... on 01 December 2013
Quark : A Web Browser with a Formally Verified Kernel edit / delete
Building a formally-verified sandbox for browser components. Neat!
to browser formal-methods security verification web ... on 12 November 2013
Software Protection Initiative - Lightweight Portable Security edit / delete
A secure read-only Linux live CD with mail, browser and encryption software -- indeed, just about everything you'd expect from one of these except for Tor. The difference being that this one's from the US Dept of Defense, intended for employees and contractors to use...
Cryptography library with an author list including djb. This has a very elegant API that's designed to be easy to incorporate into other programs -- functions are (essentially) atomic and non-allocating.
to api crypto djb nacl network security software ... on 24 October 2013
linux-user-chroot - setuid helper for making bind mounts and chrooting edit / delete
Not a million miles from one of the sandboxing ideas I wanted to play with -- although this comes with some significant security caveats.
to build-systems chroot linux sandbox security ... on 24 October 2013
ZMap · The Internet Scanner edit / delete
Stateless scanner for very large networks (e.g. the Internet). Shame they've chosen to roll their own completely broken build system and I can't compile it without copious hand-hacking.
Videos from CCC in English.
to ccc conference microcontroller reverse-engineering security video ... on 28 May 2013
« earlier | later » Page 8 of 11
tasty by Adam Sampson.