Tag: Security

17.03.2015

Mankind seems to develop “backwards” – from a real democracy during greec times to a hidden and anonymous dictatorship of money and spies. you have nothing to hide… really? why are you using encrypted e-Mail then? This gives you extra […]

03.03.2015

how to google from iran. obfsproxy (0.2.6-2) unstable; urgency=low obfsproxy now supports a new obfsucation protocol named ScrambleSuit. The previous protocols did not require any form of authentication and were vulnerable to active probes. ScrambleSuit requires a shared secret instead. Tor […]

05.02.2015

  gpg –version gpg (GnuPG) 1.4.9 gpg2 is available now: /usr/local/MacGPG2/bin/gpg2 –version gpg (GnuPG/MacGPG2) 2.0.26 libgcrypt 1.6.2 Copyright (C) 2013 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free […]

05.02.2015

update: 2020-02: First of: thanks! PGP + enigmail + Thunderbird is is working great on for example: GNU Debian Linux 10. And setup now can be done by normal users. (the enigmail wizard is pretty nice) THANKS ALL INVOLVED 🙂 […]

15.01.2015

less /var/log/kern.log … Jan 15 11:47:54 dwaves kernel: [166700.063394] UDP: bad checksum. From 116.224.66.209:53 to 78.47.157.226:14402 ulen 108 whois 116.224.66.209 inetnum: 116.224.0.0 – 116.239.255.255 netname: CHINANET-SH descr: CHINANET Shanghai province network descr: China Telecom descr: No.31,jingrong street descr: Beijing 100032 […]

20.11.2014

it’s official… we have economic warfare out there… USA wants to kick out Russia as competitor in the Gas/Oil business… if you got a monopol, you got the power. (to charge whatever you want for coffee… electricity… or oil and […]

27.10.2014

SSLv3 is older than my daughter, but is still supported by all major browsers. The latest crypto bug is a MITM (man in the middle) attack that could allow anyone with a network device (WiFi router) sitting between browser users […]

06.10.2014

http://www.dcclothesline.com/2014/03/13/snowden-bombshell-nsa-hacks-computers-installs-malware-posing-facebook/ https://www.youtube.com/watch?v=9Fj_yrmtgSw Snowden Bombshell: NSA Hacked Computers/Installed Malware While Posing as Facebook Posted on March 13, 2014 by Lily Dane Just when you thought the NSA couldn’t get any more detestable, new information released yesterday reveals that the agency has […]

Hacker erbeuten 40 millionen EUR aus Bankautomaten – Kopf der Bande gefasst
19.08.2014

40 Millionen Euro erbeutet: Mega-Cybercoup: Polizei fasst Bandenkopf in Frankfurt FOCUS ONLINE “Es ist eines der größten Cyberverbrechen der Geschichte: Im Februar 2013 erbeuteten Kriminelle mit manipulierten Kreditkarten 40 Millionen Euro. Die Täter plünderten in nur einer Nacht Bankautomaten in […]

19.08.2014

it’s official… google TRACKS YOU! with all means possible. Now amazon and facebook work together… if you noticed whatever you where interested in on amazon… suddenly appears as advertisement on facebook. So: WHATEVER YOU CAN IMAGINE – WILL BE DONE. […]

12.05.2014

can languages like RUST (memory safety per default) fix those problems? complexity = the enemy why it is important to ALWAYS K.I.S.S “OpenSSL foundation’s president, Steve Marquess, said “The mystery is not that a few overworked volunteers missed this bug; […]

12.05.2014

“Früher haben wir eher ungezielte Angriffe, wie die zufällige Einschleppung von Viren beobachtet, seit Stuxnet weiß man, dass gezielte Angriffe nicht nur möglich sind sondern auch getätigt werden. Vor einigen Monaten gab es bei der Firma RSA SecurID, einem weltweiten […]

02.12.2013

And that’s what he revealed to us: 2) How many sets of the documents you disclosed did you make, and how many different people have them? If anything happens to you, do they still exist? 2) All I can say […]

24.11.2013

Unstable code is code that was compiled with optimizations turned on… making the compiler possibly discard security checks creating security holes. Towards Optimization-Safe Systems- Analyzing the Impact of Undefined Behavior stack-sosp13.pdf Mirror: 40 percent of debian packages contain unstable code – […]