putting this here because it is one of my favourites.
nothing is immune. @shawn you like mr robot (ive only watched seasons 1 and 2) this is real life.
The Athens Affair. (I have loads of stuff like this if people are interested in reading about it - it isn’t your average hack. - its better than mr robot.)
Y’all might remember this, the ledger pin hack https://leveldown.de/blog/tensorflow-sidechannel-analysis/
Be careful out there
Yeah, think that’s bad?
@tromer has managed to distract the cats at mistfpga with his shiny mouse shaped toy. - We were just getting to nano side channel attacks. now they are weaponizing this… (despite my best efforts to keep them focused)
His paper called “Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels” - really great read. however not my area. (side channels are, acoustics are not. neither is van eck radiation. However TEMPEST is. Yeah it is confusing to me too. I let others deal with that.
Would love to have a chat with @tromer after all this development fund stuff has died down, if they get the time, there is strong overlap in what we are interested in.
I remember reading about the acoustic side-channel attack around the time when I first got on the Forum here, it still freaks me out!
This video is a great example of why it makes me sad that the ECC talks with China. (btw you get a small glimpse into how I make my money through out the video. and what weaponised exploits are worth ) I don’t think I have ever worked with zerodium though. Mainly pentest companies.
Sure the iPhone has never been secure. but watch the whole thing. look at who was targeted and how.
Hard encryption is a tool. It can be used for good or for evil. That is just the way it works. There are some parallels with zcash to this video. But it is not the closed source. zcash isn’t, with zcash technology it is the high barrier to entry from both a maths and cryptographic standpoint.
It is also not a completely fair comparison, the iPhone is not disruptive technology. zcash is. bitcoin was for a bit. but that is for another post.
Just published this!
OpenBazaar / Haven is so cool:
Thank you so much for these links. I found really useful information there!
“To give that power to Russia, China and other authoritarian states is complete dereliction of duty of the U.S. government to protect us.”
Sex offenders breathe air, let’s pass a law against it! That’ll get em maybe right?!
( this is an exaggeration exemplifying the ridiculousness of justifying an overarching infringement on basic rights to distinguish an extremely small minority of individuals
I hope they get all the sickos but its their job and I don’t know why they think it’s my responsibility to give up my basic rights just to help them do that specifically wtf)
The 3 consecutive reply limit is a lil bit annoying sometimes I will admit
Thanks for posting these. have a 3 reply reset.
The answer to the Bogatyy Grin research which seems far to be a good research at all after reading the below:
Oregon FBI Tech Tuesday: Securing Smart TVs
Tech Tuesday: Internet of Things (IoT)
Oregon FBI Tech Tuesday: Building a Digital Defense Against Calendar Fraud
Oregon FBI’s Tech Tuesday: Building a Digital Defense Using Virtual Private Networks
Not sure where else this would be relevant so I thought id post it here.
if either of these was offered to you, would you do it? why? what do you see the positions involving?
If it helps these jobs would be 200k+ (usd)
Not an article but my wife works for a dentist office and she was talking to one of her friends today who works for a different dentist office and she was telling my wife about how their system got hacked yesterday and all of their patients information is being held for $17,000 ransom
No backup was made
I’ll letya know if I hear anything else