Eben Moglen: Snowden and the Future

Eben Moglen is very angry.

to freedom politics security snowden ... on 15 December 2013

About Crossbear | pki.net.in.tum.de|crossbear.org

"Crossbear is a tool that aims to detect and localise Man-in-the-middle (MitM) attacks on the SSL/TLS [and SSH] protocols." It works by comparing the certificate you get with what others got from different locations. (I imagine CDNs will break this as usual...)

to ca certificate security ssh ssl tls ... on 14 December 2013

Quark : A Web Browser with a Formally Verified Kernel

Building a formally-verified sandbox for browser components. Neat!

to browser formal-methods security verification web ... on 12 November 2013

Software Protection Initiative - Lightweight Portable Security

A secure read-only Linux live CD with mail, browser and encryption software -- indeed, just about everything you'd expect from one of these except for Tor. The difference being that this one's from the US Dept of Defense, intended for employees and contractors to use...

to linux livecd security software ... on 09 November 2013

NaCl

Cryptography library with an author list including djb. This has a very elegant API that's designed to be easy to incorporate into other programs -- functions are (essentially) atomic and non-allocating.

to api crypto djb nacl network security software ... on 24 October 2013

linux-user-chroot - setuid helper for making bind mounts and chrooting

Not a million miles from one of the sandboxing ideas I wanted to play with -- although this comes with some significant security caveats.

to build-systems chroot linux sandbox security ... on 24 October 2013

ZMap · The Internet Scanner

Stateless scanner for very large networks (e.g. the Internet). Shame they've chosen to roll their own completely broken build system and I can't compile it without copious hand-hacking.

to ip network scanner security tcp ... on 30 August 2013

CCCen - YouTube

Videos from CCC in English.

to ccc conference microcontroller reverse-engineering security video ... on 28 May 2013

Exposed Webcam Viewer

A search engine for publically-accessible webcams. Both fascinating and terrifying.

to camera search security webcam ... on 14 April 2013

Tags related to security

- security
 
1 academia
1 access-control
1 acme
1 ag0700
1 ag0803
2 ag0907
6 amusements
2 api
1 architecture
1 arduino
3 arm
1 authentication
1 autoconf
1 avr
1 backdoor
1 bell-labs
1 bitcoin
1 blockchain
1 bounds-checking
1 bounty
1 browser
2 buffer
2 buffer-overflow
2 bug
2 bugs
1 build-systems
2 c
2 c++
4 ca
1 camera
1 capability
1 capsicum
4 ccc
4 certificate
1 certificates
1 cesrg
1 checking
1 chromium
1 chroot
1 clang
1 cloud
1 code
3 compiler
1 conference
2 container
1 coop
1 coverage
1 coverage-directed
1 coverity
2 cpu
1 crime
10 crypto
12 cryptography
1 cs
1 cypherpunks
1 debian
1 debugging
1 dect
1 design
1 dh
2 djb
1 ebooks
1 ecc
1 economics
1 el0805
1 elective
3 electronics
3 encryption
2 ers
1 ethereum
1 ethical-hacking
1 ethics
3 exploit
1 firefox
1 folk-song
4 formal-methods
1 freedom
3 fuzzing
2 gameboy
5 games
1 gcc
1 git
1 goto
2 gpg
1 gsm
2 hardening
5 history
1 homebrew
1 homeplugav
1 http
1 https
1 intel
1 ip
1 ipsec
1 javascript
1 journalism
1 jquery
1 kerberos
3 kernel
1 keyboard
1 keylogger
1 langsec
2 language-design
1 letsencrypt
1 library
1 licensing
12 linux
1 livecd
1 lts
1 luks
1 lvm
1 mac
1 memory-safety
1 metaphors
2 mgo
1 microcode
4 microcontroller
1 mmc
1 mod-ers
1 monitoring
3 nacl
5 network
6 networking
1 noise
1 notary
1 ocaml
1 openssh
2 openssl
1 org
2 os
2 overflow
2 p2p
1 packet
1 pam
2 papers
1 parser
1 password
1 patterns
1 pgp
2 philosophy
2 phone
1 phreaking
1 pki
1 playstation
1 podcasts
2 politics
1 porting
1 prime
2 privacy
1 privilege-separation
4 programming
1 proof
1 ps2
2 python
1 radio
1 ramensky
1 random
1 research
3 retrocomputing
1 retrotech
6 reverse-engineering
1 risc
1 rop
1 safe
2 safety
4 sandbox
1 scanner
1 scm
1 scotland
1 sd
1 search
2 seccomp
108 security
1 shuffle
1 sni
1 snowden
14 software
6 software-engineering
3 ssh
12 ssl
4 static-analysis
1 stoll
1 strategy
1 support
1 syscall
1 systems
1 tandy
1 tcp
1 tea
6 teaching
1 telecom
5 testing
14 tls
2 tor
1 tunnel
4 unix
1 usability
1 usable-security
2 usb
1 validation
1 varan
3 verification
1 video
1 vlc
1 vpn
1 vulnerabilities
1 vulnerability
3 web
1 webcam
1 whistleblowing
2 wireless
1 wpa
1 writing
1 x86
1 xbox