Dropsafe

by Alec Muffett

  • Resources
    • A Primer for End-to-End Encryption
    • A “Duck Test” for End-to-End Secure Messaging
    • Why Privacy will always be more impactful than Safety
    • Muffett on Passwords
    • Pre-Flight Travel Checklist
  • About
    • About
    • Login
    • FAQs
  • Search
  • RSS
    • RSS (All)
    • RSS (Comments)
  • Are you in Law Enforcement? Do you have problems correcting erroneous CCTV timestamps? There’s an App for that!

    2013/02/16 22:11:03 GMT

    My friend Dario has written one: https://itunes.apple.com/gb/app/clock-check/id586663057 Clock Check — By Dario Persechino Description Clock Check is an application designed to aid CCTV engineers and Law Enforcement personnel when calculating the time discrepancies on CCTV systems. The app calculates the difference between a ‘real time’ and a CCTV ‘system time’. This difference can then be

    (more…)

    mobile politics and law software
  • 1995, USENIX Security: Marcus Ranum pulls out a Hasselblad, a ringflash and asks me to sit for a portrait

    2013/02/16 21:56:03 GMT

    Pose is as the photographer wanted. Do what the man wants, he has the camera. My print arrived in the post a few weeks later. Subsequently he did a whole pile of other security geek portraits; where they are I don’t know, but the one of Bob Morris Sr is epic, and spattered around the

    (more…)

    personal security
  • Doris Lessing on Beauty, Entitlement …

    2013/02/15 19:18:21 GMT

    …and, perhaps, Hedonism. From the essay A Beauty, by Robert Boyers: Useful, perhaps, to recall something from Doris Lessing which may have some bearing on the question of beauty. Lessing noted what she called “a basic female ruthlessness” in herself, and went on to disdain the notion that gender is, in its essence, “socially constructed.”

    (more…)

    miscellaneous ranting
  • Burp Suite Professional now supports interception and analysis of #Tor websites & hidden services via SOCKS /ht @runasand @torproject @portswigger

    2013/02/15 15:40:33 GMT

    I predict a rapid and significant uptick in Government purchases of Burp Suite licenses: http://releases.portswigger.net/2013/02/v1505.html Burp Suite Professional – Release Notes Friday, February 15, 2013 v1.5.05 This release contains a number of feature enhancements and bugfixes, including: * The SOCKS proxy support now has an option to perform DNS lookups remotely via the proxy. This

    (more…)

    censorship and interception security software
  • 1) MakerGeek 2) Pretty LEDs 3) Arduino 4) Multiuser Sex Toy 5) Intellectual Property & Patent Argument

    2013/02/15 15:24:54 GMT

    All wrapped up in one colourful package: http://www.toymakerproject.com/hammer/ I’d mark the page NSFW except that I don’t see an obvious reason for it to be designated that way. Don’t forget to click through to the YouTube demo.

    (more…)

    fun miscellaneous ranting
  • FLASH: Hansard: Minister admits: “There is no offence of cybercrime in law” /ht @gwire #cybersecurity

    2013/02/15 14:32:36 GMT

    Cybercrime: 13 Feb 2013: Hansard Written Answers and Statements – TheyWorkForYou. Parliamentary Under-Secretary of State for Crime and Security: Quote: The Government’s Cyber Security Strategy made it clear that there are crimes which only exist in the digital world, in particular those that target the integrity of computer networks and online systems. However, the internet

    (more…)

    key postings politics and law security
  • If you want to try tracking the Asteroid 2012 DA14 fly-by tonight, use HeavensAbove # shortcuts

    2013/02/15 11:11:57 GMT

    Method: Visit Heavens Above Location Database and search for your location Pick your Location from the responses for the search When redirected to the homepage, click the Click here for a sky chart and table of positions for your location at the top Shortcuts: London Birmingham Manchester Edinburgh London illustrated below, but using the website

    (more…)

    astronomy
  • Next time you need examples of Cyberattacks, these are three of them… apparently… /ht @jeffreycarr

    2013/02/15 08:49:35 GMT

    Cited by Jeffrey Carr because they are both “Cyber” according to him, and might be “Attacks” according to Thomas Rid and Carl von Clausewitz. It dates from 2011, but still, quoth Mr Carr: Personally, I’m not a fan of the term “cyberwar” as evidenced by a recent article that I wrote for Slate, however it is

    (more…)

    security
  • A Chinese Hacker’s Identity Unmasked – Businessweek # surprising #mustread

    2013/02/14 22:33:04 GMT

    A bit light towards the end, but good. Some of the addresses had also figured in Chinese espionage campaigns documented by other researchers. They were part of a block of about 2,000 addresses belonging to China Unicom (CHU), one of the country’s largest Internet service providers. Trails of hacks had led Stewart to this cluster

    (more…)

    security
  • VAX Cluster running on VAX Emulator running on Raspberry Pi # too cool for words, today is over

    2013/02/14 08:42:14 GMT

    Hat tip to Gilberto Persico for this: http://www.designspark.com/blog/a-raspberry-pi-vax-cluster In a blog post last month I looked at how a Raspberry Pi can be used to emulate a formidable IBM mainframe, and in this post I describe how a pair can be used to emulate VAX computers which can then be configured to form a VMScluster.

    (more…)

    fun hardware software
  • WANTED: *Uncorrupted* Energetic #Security Geek, ideally: mixed Web/OpenSource/Developer/Linux/SysAdmin Background, UK

    2013/02/13 19:42:38 GMT

    UPDATE: see updated title, see comment below. If you roughly fit this bill and are looking for flexible working in a lovely, boutique company of similar folk – and if you have the native sense of curiosity that is essential to a role like this – then drop me a line: alec.muffett@gmail.com  

    (more…)

    geek security
  • Stop pretending cyberspace exists – Salon.com # Traction, at bloody last

    2013/02/13 12:40:54 GMT

    Some ideas make you dumber the moment you learn of them. One of those ideas is the concept of “cyberspace.” The term was coined by William Gibson in his novel “Neuromancer” and defined as “a graphic representation of data abstracted from the banks of every computer in the human system …” As a metaphor that

    (more…)

    security
←Previous Page
1 … 212 213 214 215 216 … 665
Next Page→

Dropsafe

Proudly powered by WordPress

Loading Comments...