Loading

greenwald-30c3-keynote / transcript

  1. greenwald-30c3-keynote / transcript
  2.  
  3. December 30, 2013
  4.  
  5. https://github.com/poppingtonic/greenwald-30c3-keynote/blob/master/transcript/transcript.md

PWNEDbyNSA - Pwned by NSA

  1. PWNEDbyNSA - Pwned by NSA
  2.  
  3. ##
  4.  
  5. - 2013-1811.pdf         NSA TAO ANT COTTONMOUTH (DE Original)            December 29, 2013

Archive.org: MAME 0.151 ROMs (November 2013) 42.8GB zip/torrent

  1. Archive.org: MAME 0.151 ROMs (November 2013) 42.8GB zip/torrent
  2.  
  3. #
  4.  
  5. that's the jingle bell

US Military Commissions Sock Puppet Program

  1. US Military Commissions Sock Puppet Program
  2.  
  3. What's old is new again
  4.  
  5. http://yro.slashdot.org/story/11/03/18/023239/us-military-commissions-sock-puppet-program

a portage bug

  1. >>> Unmerging (1 of 1) net-p2p/litecoind-0.8.5.3_rc3...
  2. shell-init: error retrieving current directory: getcwd: cannot access parent directories: No such file or directory
  3. shell-init: error retrieving current directory: getcwd: cannot access parent directories: No such file or directory
  4. job-working-directory: error retrieving current directory: getcwd: cannot access parent directories: No such file or directory
  5. chdir: error retrieving current directory: getcwd: cannot access parent directories: No such file or directory

OpenBSD + Truecrypt + Rip Anywhere Mp3 player

  1. OpenBSD + Truecrypt + Rip Anywhere Mp3 player
  2.  
  3. #####
  4.  
  5. Give me an mp3 player which has the following features:

Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your compu

  1. Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU
  2.  
  3. http://www.extremetech.com/extreme/173108-researchers-crack-the-worlds-toughest-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu
  4.  
  5. By Sebastian Anthony on December 18, 2013 at 2:27 pm

Top official in Obama birth mystery killed - Loretta Fuddy

  1. Top official in Obama birth mystery killed - Loretta Fuddy
  2.  
  3. Woman lone fatality in Hawaii plane crash
  4.  
  5. http://www.wnd.com/2013/12/top-official-in-obama-birth-mystery-killed/

Tails 0.22 released @ Dec 11, 2013

  1. Tails 0.22 released @ Dec 11, 2013
  2. ============
  3. CHANGELOG
  4.  
  5. tails (0.22) unstable; urgency=medium

obycejna tiskarna HP

  1. PORT     STATE SERVICE
  2. 80/tcp   open  http
  3. 81/tcp   open  hosts2-ns
  4. 515/tcp  open  printer
  5. 631/tcp  open  ipp

Tor One Hop Honeypots

  1. Is Anonymous Access to TOR Attainable?
  2.      
  3. 7 December 2013
  4.      
  5. http://cryptome.org/2013/12/tor-anon-access.htm

exopolitika

  1. Starodávná lidská rasa smíchaná se zcela neznámými druhy
  2. NASA OBDRŽELA RÁDIOVÉ SIGNÁLY ZE STŘEDU ZEMĚ
  3. Cizinci na planetě Zemi?
  4. Penzionovaný důstojník USAF hovoří o mimozemšťanech a atomovkách, skupině ,,UFO Cabal” a svých zážitcích z únosů
  5. DRAKONIÁNI A POHŘEŠOVANÉ DĚTI

bad BIOS saga continues - 12/13

  1. Scientist-developed malware prototype covertly jumps air gaps using inaudible sound
  2. --------------------
  3. Malware communicates at a distance of 65 feet using built-in mics and speakers.
  4.  
  5. by Dan Goodin - Dec 2, 2013 7:29 pm UTC

Facebook blacked out bubbles

  1. ._5uch {
  2.     background-image: url("http://i.imgur.com/T2LPj.png") !important;
  3.     border-radius: 15px;
  4.     margin-bottom: 7px;
  5.     padding: 0px;

On Covert Acoustical Mesh Networks in Air (RE: Bad Bios)

  1. On Covert Acoustical Mesh Networks in Air (RE: Bad Bios)
  2.  
  3. "Abstract-Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. We construct a covert channel between different computing systems that utilizes audio modulation/demodulation to exchange data between the computing systems over the air medium. The underlying network stack is based on a communication system that was originally designed for robust underwater communication. We adapt the communication system to implement covert and stealthy communications by utilizing the near ultrasonic frequency range.