Notices tagged with security, page 11
-
Fabrication-Time Attacks on CPUs: Ken Thompson was right While the move to smaller transistors has been a boon for performance it has dramatically increased the cost to fabricate chips using those smaller transistors. This forces the vast majority of chip design companies to trust a third party—often overseas—to fabricate their design. To guard against shipping chips with erro…
-
Fabrication-Time Attacks on CPUs: Ken Thompson was right While the move to smaller transistors has been a boon for performance it has dramatically increased the cost to fabricate chips using those smaller transistors. This forces the vast majority of chip design companies to trust a third party—often overseas—to fabricate their design. To guard against shipping chips with erro…
-
!security !surveillance Now why does #Microsoft send their Hotmail/Outlook/Live email through the UK Department of Defence? Or is it the UK #DoD that hijacks the emails? Because the SPF rules and DKIM checks fail _before_ the last jump to my server (and Microsoft's servers don't consider it a failure): authentication-results: spf=softfail (sender IP is http://status.ha…
-
I saw this in a very recent proposition to the Swedish government too: http://status.hackerposse.com/url/9850 "ska stödja vissa funktioner för att säkerställa att programvara enbart kan laddas i radioutrustningen om det har visats att kombinationen av radioutrustning och programvara överensstämmer." (radio equipment must have functionality that ensures that only …
-
Am I reading this right? Mobile phones broadcasting their _historical_ SSIDs rather than just MAC address?! https://social.umeahackerspace.se/url/54552 !security
(if "wifi based location services" are on)
-
^- A third-party description on how I introduce people to !foss and !security software (in Swedish).
[http://www.magdalenanordin.se/blog/?p=18213]
-
Better recommend them groups, as there people can find more easier each other: !fedgroups !fediverse !privacy !listening !videogames !minecraft !crypto !diaspora !debian !fosdem !gnusocial !grrr !java !ostatus !security and many, many more. :-)
-
What are good alternatives to self-hosting e-mail? !fediverse !privacy !security
-
What are good alternatives to self-hosting e-mail? !fediverse !privacy !security
-
!security !question
any experience with #snort on !debian ?
#intrusion #prevention system,
#real-time #traffic #analysis and packet logging!fediverse !ufos !vivalafederation
-
@jaideneverett Twitter as a sponsor. The same company that block the accounts of Tor users. #Hypocrisy cc/ !security !privacy
-
A very nice practical demo of !security really: One of the participants had an encrypted harddrive, showcasing the protection even against physical access it can afford (no way of resetting the root password without first decrypting the harddrive). !umehack
-
@mmn The first thing we had to do was hack the Macs the school had lent out so the students had administrator access. !security !umehack
-
So tired, but I think mine and @pettter's workshop on !security for journalists went well (despite some issues). !umehack represent!
-
Google nutzt jetzt ausschließlich #BoringSSL
https://www.imperialviolet.org/2015/10/17/boringssl.html
!crypto !security
-
@theru it reminds me to this talk:
re:publica 2014 - Let's talk about sex baby, let's talk about PGP
https://www.youtube.com/watch?v=BBgZyV4iltw
!privacy !security
-
#SecTor, The #Toronto !Security Conference starts Monday, 19 October: https://sector.ca/ @sectorca on Twitter
-
So, a machine costing a few hundred million dollars, running for a year, can break about one DH key per year. Too bad many implementations use the _exact same ones_ !crypto !security
https://freedom-to-tinker.com/blog/haldermanheninger/how-is-nsa-breaking-so-much-crypto/