Quark : A Web Browser with a Formally Verified Kernel edit / delete

Building a formally-verified sandbox for browser components. Neat!

to browser formal-methods security verification web ... on 12 November 2013

Software Protection Initiative - Lightweight Portable Security edit / delete

A secure read-only Linux live CD with mail, browser and encryption software -- indeed, just about everything you'd expect from one of these except for Tor. The difference being that this one's from the US Dept of Defense, intended for employees and contractors to use...

to linux livecd security software ... on 09 November 2013

NaCl edit / delete

Cryptography library with an author list including djb. This has a very elegant API that's designed to be easy to incorporate into other programs -- functions are (essentially) atomic and non-allocating.

to api crypto djb nacl network security software ... on 24 October 2013

linux-user-chroot - setuid helper for making bind mounts and chrooting edit / delete

Not a million miles from one of the sandboxing ideas I wanted to play with -- although this comes with some significant security caveats.

to build-systems chroot linux sandbox security ... on 24 October 2013

ZMap · The Internet Scanner edit / delete

Stateless scanner for very large networks (e.g. the Internet). Shame they've chosen to roll their own completely broken build system and I can't compile it without copious hand-hacking.

to ip network scanner security tcp ... on 30 August 2013

CCCen - YouTube edit / delete

Videos from CCC in English.

to ccc conference microcontroller reverse-engineering security video ... on 28 May 2013

Exposed Webcam Viewer edit / delete

A search engine for publically-accessible webcams. Both fascinating and terrifying.

to camera search security webcam ... on 14 April 2013

Essays edit / delete

A selection of... randomly interesting stuff related to licensing, cypherpunkery, etc. I honestly can't remember how I got here. (*checks browser history* -- oh, it was the article on Silk Road.)

to amusements bitcoin cypherpunks licensing philosophy politics security tea ... on 24 March 2013

Pokemon Yellow Total Control Hack edit / delete

Detailed explanation of the previous video (arbitrary code execution via Pokemon Yellow).

to amusements arm buffer gameboy games overflow security ... on 11 February 2013

Browser bookmarks: tasty+ | tasty= Log in | Export | Atom

Tags related to security

- security
 
1 + academia
1 + access-control
1 + acme
1 + ag0700
1 + ag0803
2 + ag0907
6 + amusements
2 + api
1 + architecture
1 + arduino
3 + arm
1 + authentication
1 + autoconf
1 + avr
1 + backdoor
1 + bell-labs
1 + bitcoin
1 + blockchain
1 + bounds-checking
1 + bounty
1 + browser
2 + buffer
2 + buffer-overflow
2 + bug
2 + bugs
1 + build-systems
2 + c
2 + c++
4 + ca
1 + camera
1 + capability
1 + capsicum
4 + ccc
4 + certificate
1 + certificates
1 + cesrg
1 + checking
1 + chromium
1 + chroot
1 + clang
1 + cloud
1 + code
3 + compiler
1 + conference
2 + container
1 + coop
1 + coverage
1 + coverage-directed
1 + coverity
2 + cpu
1 + crime
10 + crypto
12 + cryptography
1 + cs
1 + cypherpunks
1 + debian
1 + debugging
1 + dect
1 + design
1 + dh
2 + djb
1 + ebooks
1 + ecc
1 + economics
1 + el0805
1 + elective
3 + electronics
3 + encryption
2 + ers
1 + ethereum
1 + ethical-hacking
1 + ethics
3 + exploit
1 + firefox
1 + folk-song
4 + formal-methods
1 + freedom
3 + fuzzing
2 + gameboy
5 + games
1 + gcc
1 + git
1 + goto
2 + gpg
1 + gsm
2 + hardening
5 + history
1 + homebrew
1 + homeplugav
1 + http
1 + https
1 + intel
1 + ip
1 + ipsec
1 + javascript
1 + journalism
1 + jquery
1 + kerberos
3 + kernel
1 + keyboard
1 + keylogger
1 + langsec
2 + language-design
1 + letsencrypt
1 + library
1 + licensing
12 + linux
1 + livecd
1 + lts
1 + luks
1 + lvm
1 + mac
1 + memory-safety
1 + metaphors
2 + mgo
1 + microcode
4 + microcontroller
1 + mmc
1 + mod-ers
1 + monitoring
3 + nacl
5 + network
6 + networking
1 + noise
1 + notary
1 + ocaml
1 + openssh
2 + openssl
1 + org
2 + os
2 + overflow
2 + p2p
1 + packet
1 + pam
2 + papers
1 + parser
1 + password
1 + patterns
1 + pgp
2 + philosophy
2 + phone
1 + phreaking
1 + pki
1 + playstation
1 + podcasts
2 + politics
1 + porting
1 + prime
2 + privacy
1 + privilege-separation
4 + programming
1 + proof
1 + ps2
2 + python
1 + radio
1 + ramensky
1 + random
1 + research
3 + retrocomputing
1 + retrotech
6 + reverse-engineering
1 + risc
1 + rop
1 + safe
2 + safety
4 + sandbox
1 + scanner
1 + scm
1 + scotland
1 + sd
1 + search
2 + seccomp
1 + shuffle
1 + sni
1 + snowden
14 + software
6 + software-engineering
3 + ssh
12 + ssl
4 + static-analysis
1 + stoll
1 + strategy
1 + support
1 + syscall
1 + systems
1 + tandy
1 + tcp
1 + tea
6 + teaching
1 + telecom
5 + testing
14 + tls
2 + tor
1 + tunnel
4 + unix
1 + usability
1 + usable-security
2 + usb
1 + validation
1 + varan
3 + verification
1 + video
1 + vlc
1 + vpn
1 + vulnerabilities
1 + vulnerability
3 + web
1 + webcam
1 + whistleblowing
2 + wireless
1 + wpa
1 + writing
1 + x86
1 + xbox