Mankind seems to develop “backwards” – from a real democracy during greec times to a hidden and anonymous dictatorship of money and spies. you have nothing to hide… really? why are you using encrypted e-Mail then? This gives you extra […]
how to google from iran. obfsproxy (0.2.6-2) unstable; urgency=low obfsproxy now supports a new obfsucation protocol named ScrambleSuit. The previous protocols did not require any form of authentication and were vulnerable to active probes. ScrambleSuit requires a shared secret instead. Tor […]
gpg –version gpg (GnuPG) 1.4.9 gpg2 is available now: /usr/local/MacGPG2/bin/gpg2 –version gpg (GnuPG/MacGPG2) 2.0.26 libgcrypt 1.6.2 Copyright (C) 2013 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free […]
update: 2020-02: First of: thanks! PGP + enigmail + Thunderbird is is working great on for example: GNU Debian Linux 10. And setup now can be done by normal users. (the enigmail wizard is pretty nice) THANKS ALL INVOLVED 🙂 […]
less /var/log/kern.log … Jan 15 11:47:54 dwaves kernel: [166700.063394] UDP: bad checksum. From 116.224.66.209:53 to 78.47.157.226:14402 ulen 108 whois 116.224.66.209 inetnum: 116.224.0.0 – 116.239.255.255 netname: CHINANET-SH descr: CHINANET Shanghai province network descr: China Telecom descr: No.31,jingrong street descr: Beijing 100032 […]
it’s official… we have economic warfare out there… USA wants to kick out Russia as competitor in the Gas/Oil business… if you got a monopol, you got the power. (to charge whatever you want for coffee… electricity… or oil and […]
SSLv3 is older than my daughter, but is still supported by all major browsers. The latest crypto bug is a MITM (man in the middle) attack that could allow anyone with a network device (WiFi router) sitting between browser users […]
The problem: Some people care about their privacy – most don’t. So the NSA/CIA/CSHQ/Mi6/BSD-Spying-Complex (linked up with the Google & Facebook probably with the industrial-military complex) thanks to the internet & smartphones, keeps collecting data on their sheeps to find […]
update: 2020-09: problems getting bigger without regular updates because a SmartPhone (no matter Android/Samsung or IOS/Apple based) are essentially complete “notebook computers” with a very very small form factor directly or NAT (NAT better to avoid direct attacks, but no […]
http://www.dcclothesline.com/2014/03/13/snowden-bombshell-nsa-hacks-computers-installs-malware-posing-facebook/ https://www.youtube.com/watch?v=9Fj_yrmtgSw Snowden Bombshell: NSA Hacked Computers/Installed Malware While Posing as Facebook Posted on March 13, 2014 by Lily Dane Just when you thought the NSA couldn’t get any more detestable, new information released yesterday reveals that the agency has […]
40 Millionen Euro erbeutet: Mega-Cybercoup: Polizei fasst Bandenkopf in Frankfurt FOCUS ONLINE “Es ist eines der größten Cyberverbrechen der Geschichte: Im Februar 2013 erbeuteten Kriminelle mit manipulierten Kreditkarten 40 Millionen Euro. Die Täter plünderten in nur einer Nacht Bankautomaten in […]
it’s official… google TRACKS YOU! with all means possible. Now amazon and facebook work together… if you noticed whatever you where interested in on amazon… suddenly appears as advertisement on facebook. So: WHATEVER YOU CAN IMAGINE – WILL BE DONE. […]
Hello Dave. I control your thermostat. Google’s Nest gets hacked Above: Google Nest hacked Image Credit: KRWG
can languages like RUST (memory safety per default) fix those problems? complexity = the enemy why it is important to ALWAYS K.I.S.S “OpenSSL foundation’s president, Steve Marquess, said “The mystery is not that a few overworked volunteers missed this bug; […]
quelle: http://www.bfs.de/de/elektro/strahlenschutz_mobilfunk/schutz/vorsorge/SAR_Werte.pdf
“Früher haben wir eher ungezielte Angriffe, wie die zufällige Einschleppung von Viren beobachtet, seit Stuxnet weiß man, dass gezielte Angriffe nicht nur möglich sind sondern auch getätigt werden. Vor einigen Monaten gab es bei der Firma RSA SecurID, einem weltweiten […]
“Einschätzung des BSI zur Sicherheitslücke im Internet Explorer Bonn, 28.04.2014. Das Bundesamt für Sicherheit in der Informationstechnik (BSI) weist auf eine Schwachstelle in allen Versionen des Browsers “INDER-NETT-EXPLORER” (wo mit man nette Inder entdecken kann) hin. Angaben des Herstellers Microsoft zufolge wird diese […]
Update! Ransomeware mal 4 US-Justizministerium: Angriffe durch Ransomware haben sich im vergangenen Jahr vervierfacht. Laut dem US-Justizministerium greift die Ransomware immer weiter um sich. Angeblich werden am Tag 4.000 Computer infiziert. Das FBI schätzt derweil den durch Ransomware entstandenen Schaden […]
And that’s what he revealed to us: 2) How many sets of the documents you disclosed did you make, and how many different people have them? If anything happens to you, do they still exist? 2) All I can say […]
Unstable code is code that was compiled with optimizations turned on… making the compiler possibly discard security checks creating security holes. Towards Optimization-Safe Systems- Analyzing the Impact of Undefined Behavior stack-sosp13.pdf Mirror: 40 percent of debian packages contain unstable code – […]
WARNING: use at own risk! use a dedicated computer for shredding harddisk, that has no valuable data stored or attached (in case the operator enters the wrong drive letter = all data gone) have been warned! WARNING! this method might […]