13 Principles of Threat Intelligence Communication
I have written at length about bad threat intelligence. However, I think it is time that I spend the effort communicating my key principles to making great threat intelligence. One aspect of great threat intelligence is great communication. As I have said before, you may be the greatest analyst... Read more
Bribe or ‘Tax’? NSA gives 10milion to RSA for Backdoor Access
Hmm. Hold up. So if we go by this Wikipedia entry.. “Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$ 2.1 billion and operates as a division within EMC.” People need to understand, this means RSA took around 2%... Read more
How Online Privacy Tools Are Changing Internet Security
How online privacy tools are changing Internet security and driving the (probably quixotic) quest for anonymity in the digital age. For many of us, the Internet is like a puppy—lovable by design and fun to play with, but prone to biting. We suspect that our digital footprint is being... Read more
Whonix: The Anonymous Operating System
Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user’s real IP/location. Whonix consists of two machines, which are connected through an isolated... Read more
How To Secure Your Android Phone Like the NSA
Rejoice, paranoid security fanatics! There’s finally a version of Android that enables your obsessive need to lock and control each and every file on your mobile device. There’s just one catch: you’ve got to trust the National Security Agency to use it. The NSA has released its security-enhanced version... Read more
Cryptoparty Goes Viral: Pen testers, Privacy Geeks Spread Security to the Masses
Security professionals, geeks and hackers around the world are hosting a series of cryptography training sessions for the general public. The ‘crytoparty’ sessions were born in Australia and kicked off last week in Sydney and Canberra along with two in the US and Germany. Information security experts and privacy... Read more
Encryption Becomes Illegal In the UK: Jail Time For Failure To Provide Keys
There was some surprise in the comments of yesterday’s post over the fact that the United Kingdom has effectively outlawed encryption: the UK will send its citizens to jail for up to five years if they cannot produce the key to an encrypted data set. First of all, references... Read more
How to secure your computer and surf fully Anonymous BLACK-HAT STYLE
This is a guide with which even a total noob can get high class security for his system and complete anonymity online. But its not only for noobs, it contains a lot of tips most people will find pretty helpfull. It is explained so detailed even the biggest noobs... Read more
US Police Can Copy Your iPhone’s Contents In Under Two Minutes
It has emerged that Michigan State Police have been using a high-tech mobile forensics device that can extract information from over 3,000 models of mobile phone, potentially grabbing all media content from your iPhone in under two minutes. The CelleBrite UFED is a handheld device that Michigan officers have been using since... Read more
An Analysis of Anonymity in the Bitcoin System
Bitcoin is not inherently anonymous. It may be possible to conduct transactions is such a way so as to obscure your identity, but, in many cases, users and their transactions can be identified. We have performed an analysis of anonymity in the Bitcoin system and published our results in a preprint... Read more
Verifying Claims of Full-Disk Encryption in Hard Drive Firmware
Date: Wed, 9 Nov 2011 10:16:11 +0100 From: Eugen Leitl <eugenleitl.org> To: cypherpunksal-qaeda.net Subject: Re: Verifying Claims of Full-Disk Encryption in Hard Drive Firmware —– Forwarded message from Tom Ritter <tomritter.vg> —– From: Tom Ritter <tomritter.vg> Date: Tue, 08 Nov 2011 19:51:53 -0500 To: p2p-hackerslists.zooko.com Subject: Re: ... Read more