Next Blackhat promises to be interesting: Hackers can break Tor Network Anonimity with USD 3000 | Security Affairs. as Pierluigi Paganini, a renowned expert in Information Security says: — I confess you to be very excited to see the presentation of the two experts, as they had anticipated, with a limited budget, it is possible to track users on Tor network, so let’s imagine the capabilities of a persistent attacker with much more computational capability and with a “couple gigabit links”. — Indeed, that would be some news for the information security… Read more Hackers can break Tor Network Anonimity with USD 3000 | Security Affairs →
If you want to play Spy&Spy, then http://www.nsaplayset.org/ is your playground. The inventor of this smallish lookalike “webshop” for the ANT catalogue presents his proof of concept during Defcon:… Read more Serious Playstore →
Since the discontinuation of Truecrypt (a platform-independent encryption utility that has had some Linux distros reject it due to not completely compatible open source licencing), several groups, companies and interested parties have started forking it – both from the community of opensource experts and from the industry that is near commercial or governmental interest – latest to the show: Sirrix. Communication with the developers that have abandoned the project have proven to be difficult, but Matthew Green, cryptographer and research professor at Johns Hopkins University has been in contact with at… Read more Truecrypt licensing and codebase woes →
You must be logged in to post a comment.