Advanced persistent cybersecurity
Sunday, December 29, 2019
So that tweet was misunderstood
I'm currently experiencing the toxic hell that is a misunderstood tweet going viral. It's a property of the social media. The more t...
Friday, December 13, 2019
This is finally the year of the ARM server
"RISC" was an important architecture from the 1980s when CPUs had fewer than 100,000 transistors. By simplifying the instruction s...
Thursday, September 26, 2019
Trump's conversation with the President of Ukraine mentions "CrowdStrike". I thought I'd explain this. What was said? ...
Saturday, August 31, 2019
Thread on the OSI model is a lie
I had a Twitter thread on the OSI model . Below it's compiled into one blogpost
Thread on network input parsers
This blogpost contains a long Twitter thread on input parsers . I thought I'd copy the thread here as a blogpost. I am spending f...
Saturday, August 10, 2019
Hacker Jeopardy, Wrong Answers Only Edition
Among the evening entertainments at DEF CON is "Hacker Jeopardy", like the TV show Jeopardy, but with hacking tech/culture questio...
Sunday, August 04, 2019
Securing devices for DEFCON
There's been much debate whether you should get burner devices for hacking conventions like DEF CON ( phones or laptops ). A better dis...
Sunday, July 28, 2019
Why we fight for crypto
This last week, the Attorney General William Barr called for crypto backdoors . His speech is a fair summary of law-enforcement's side ...
View web version