Category Security

15.08.2019 - link drop

DEF CON 23 - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks NTPsec

13.08.2019 - link drop

Talk about unintended consequences: GDPR is an identity thief’s dream ticket to Europeans’ data • The Register

12.08.2019 - link drop

Inside the Apple T2 Open Sourcing the Kubernetes Security Audit - Cloud Native Computing Foundation

09.08.2019 - link drop

The Death of Social Reciprocity in the Era of Digital Distraction - Scientific American Blog Network The Rule Of 2 Chris’s Wiki :: blog/unix/NoSwapConsequence You 2.

23.07.2019 - link drop

Vim anti-patterns | Arabesque Mitigations Against Adversarial Attacks | News from the Lab Trying to deploy WPA3 on my home network

22.07.2019 - link drop

The Internet Has Made Dupes—and Cynics—of Us All | WIRED Avoid Indirection in Code Understanding Docker container escapes | Trail of Bits Blog

16.07.2019 - link drop

Why Procrastinators Procrastinate How to Beat Procrastination The Procrastination Matrix Your Pa$$word doesn’t matter - Microsoft Tech Community - 731984 XXE at Bol.

Securing Hardware with Coreboot

This document provides an overview about current state of security in the field of hardware firmware and try to address some of the issues with an open source solution called ’Coreboot’. With this thesis further issues of modern hardware will be explain.

02.07.2019 - link drop

media.ccc.de -Type confusion: discovery, abuse, and protection Getting 2FA Right in 2019 | Trail of Bits Blog

16.06.2019 - link drop

Attribution is not Transitive – Tribune Publishing Cyber Attack as a Case Study – Robert M.