Advanced persistent cybersecurity
Saturday, August 10, 2019
Hacker Jeopardy, Wrong Answers Only Edition
Among the evening entertainments at DEF CON is "Hacker Jeopardy", like the TV show Jeopardy, but with hacking tech/culture questio...
Sunday, August 04, 2019
Securing devices for DEFCON
There's been much debate whether you should get burner devices for hacking conventions like DEF CON ( phones or laptops ). A better dis...
Sunday, July 28, 2019
Why we fight for crypto
This last week, the Attorney General William Barr called for crypto backdoors . His speech is a fair summary of law-enforcement's side ...
Friday, June 14, 2019
Censorship vs. the memes
The most annoying thing in any conversation is when people drop a meme bomb, some simple concept they've heard elsewhere in a nice pack...
Friday, May 31, 2019
Some Raspberry Pi compatible computers
I noticed this spreadsheet over at r/raspberry_pi reddit. I thought I'd write up some additional notes. https://docs.google.com/spread...
Wednesday, May 29, 2019
Your threat model is wrong
Several subjects have come up with the past week that all come down to the same thing: your threat model is wrong. Instead of addressing the...
Tuesday, May 28, 2019
Almost One Million Vulnerable to BlueKeep Vuln (CVE-2019-0708)
Microsoft announced a vulnerability in it's "Remote Desktop" product that can lead to robust, wormable exploits. I scanned the...
View web version