« earlier | later » Page 9 of 11
The big GSM write-up – how to capture, analyze and crack GSM? – 1. | Going on my way… edit / delete
A four-part series.
to crypto gsm monitoring phone security ... on 01 December 2013
Quark : A Web Browser with a Formally Verified Kernel edit / delete
Building a formally-verified sandbox for browser components. Neat!
to browser formal-methods security verification web ... on 12 November 2013
Software Protection Initiative - Lightweight Portable Security edit / delete
A secure read-only Linux live CD with mail, browser and encryption software -- indeed, just about everything you'd expect from one of these except for Tor. The difference being that this one's from the US Dept of Defense, intended for employees and contractors to use...
Cryptography library with an author list including djb. This has a very elegant API that's designed to be easy to incorporate into other programs -- functions are (essentially) atomic and non-allocating.
to api crypto djb nacl network security software ... on 24 October 2013
linux-user-chroot - setuid helper for making bind mounts and chrooting edit / delete
Not a million miles from one of the sandboxing ideas I wanted to play with -- although this comes with some significant security caveats.
to build-systems chroot linux sandbox security ... on 24 October 2013
ZMap · The Internet Scanner edit / delete
Stateless scanner for very large networks (e.g. the Internet). Shame they've chosen to roll their own completely broken build system and I can't compile it without copious hand-hacking.
Videos from CCC in English.
to ccc conference microcontroller reverse-engineering security video ... on 28 May 2013
Exposed Webcam Viewer edit / delete
A search engine for publically-accessible webcams. Both fascinating and terrifying.
A selection of... randomly interesting stuff related to licensing, cypherpunkery, etc. I honestly can't remember how I got here. (*checks browser history* -- oh, it was the article on Silk Road.)
to amusements bitcoin cypherpunks licensing philosophy politics security tea ... on 24 March 2013
Pokemon Yellow Total Control Hack edit / delete
Detailed explanation of the previous video (arbitrary code execution via Pokemon Yellow).
to amusements arm buffer gameboy games overflow security ... on 11 February 2013
« earlier | later » Page 9 of 11
tasty by Adam Sampson.