« earlier | later » Page 9 of 11
A selection of... randomly interesting stuff related to licensing, cypherpunkery, etc. I honestly can't remember how I got here. (*checks browser history* -- oh, it was the article on Silk Road.)
to amusements bitcoin cypherpunks licensing philosophy politics security tea ... on 24 March 2013
Pokemon Yellow Total Control Hack
Detailed explanation of the previous video (arbitrary code execution via Pokemon Yellow).
to amusements arm buffer gameboy games overflow security ... on 11 February 2013
TASVideos submissions: #3767: bortreb's GBC Pokémon Yellow "Executes Arbitrary Code" in 12:51.87
How to exploit a buffer overflow -- in a Gameboy Color game. (Warning: may be a bit tedious to do by hand!)
to amusements arm buffer gameboy games overflow security ... on 11 February 2013
TLS SNI Test Site: bob.sni.velox.ch
Test whether your browser supports SNI.
Jefferson’s Wheel » Blog Archive » Private Editing Using Untrusted Cloud Services
One to discuss at the CES group at some point.
UNHOSTED - Freedom from web 2.0's monopoly platforms
I like the idea, but I'm not wild about the execution -- it just means you're relying on lots of fragile, poorly-engineered web services, rather than one.
More interesting for the links in their FAQ than for the service itself, although a NetworkManager plugin that uses this would be an obvious application.
to cryptography network security wireless wpa ... on 17 August 2010
Chris's Wiki :: blog/python/IdealDWikiCrypto
Using HMAC for web auth. I should fix tasty to do this at some point.
to crypto programming python security web ... on 27 January 2010
isolate - Project Hosting on Google Code
Build chroot environments on the fly, so you can run insecure programs reasonably easily.
Investing DECT security, and various open-source implementations of it.
« earlier | later » Page 9 of 11
tasty by Adam Sampson.