Let's Discuss the Potential for Vulnerability Here: Why you should check your secrets into Git | Warren Parad (55:08) (youtu.be)
Slides - https://authress.io/l/codemotion...
This magazine is from a federated server and may be incomplete. Browse more on the original instance.
Slides - https://authress.io/l/codemotion...
Video-Based Cryptanalysis
DEF CON Infosec super-band the Cult of the Dead Cow has released Veilid (pronounced vay-lid), an open source project applications can use to connect up clients and transfer information in a peer-to-peer decentralized manner....
Kevin Mitnick (RIP) visits Google’s NYC office to discuss his book “Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker” with Eran Feigenbaum, Google’s Director of Security for Google Apps. This event took place on August 17, 2011, as part of the Authors@Google series....
Secret texts buried in a picture of your dog? Image Analyst Dr. Mike Pound explains the art of steganography in digital images.
DEFCON 31: August 10, 2023 - August 13, 2023 in Las Vegas, NV
In the early 1990s, a group of mathematicians, misfits, hackers, and hobbyists calling themselves “the cypherpunks” came together around a shared belief that the internet would either demolish society’s artificial walls or lay the groundwork for an Orwellian state. They saw cryptography as a weapon against central planning...
L0pht Heavy Industries testifying before the United States Senate Committee on Governmental Affairs, Live feed from CSPAN, May 19, 1998. Starring Brian Oblivion, Kingpin (Joe Grand), Tan, Space Rogue, Weld Pond, Mudge, and Stefan von Neumann....
In this video I explore an elaborate cryptographic internet puzzle orchestrated by a mysterious individual or group known as Cicada 3301....
Soft White Underbelly interview and portrait of Gummo, a computer hacker from Jacksonville, Florida....
Here’s a good laugh. A stupid man interviews the “#1 ethical hacker in the world”.
Cool projects are rare. Here I found one I want to show to you. An off-grid personal communicator. It includes a lot of new technologies: ESP32, Smartphones, LoRa, BLE, GPS, Mesh, and as you see, 3D printing. And it solves a problem that could be seen as a human right: Personal SMS style communication everywhere in the world,...
Quantum computing will bring tumultuous change to the world of information security in the coming decade. As multi-qubit systems use quantum algorithms to slice through even 4096-bit PK encryption in seconds, new Quantum Encryption will be required to ensure data security. Join Konstantinos for a look at real world experiments...
my first impressions of qubes os the reasonably secure operating system
If the police can spy on us, we can spy on them. Legally, that is.
The Ace has returned with yet another Cyber Tech Tool review! Today we look at the Flipper Zero, a portable multi-tool for pentesters and hardware geeks that comes in the form of a tamagotchi. This hardware opens up the world of radio protocols, access control systems, hardware, and more to what was previously a niche security...
John Perkins describes the methods he used to bribe and threaten the heads of state of countries on four continents in order to create a global empire and he reveals how the leaders who did not “play the game" were assassinated or overthrown. He brings us up to date about the way the economic hit man system has spread from...
perhaps we can come up with a way to pipe this to make it more fed friendly.
and here’s how that channel recommends hardening an android phone: youtu.be/mlW6I5Kuj6c
How do you prove something without giving away all your data? Zero Knowledge Proofs could hold the answer. Alberto Sonnino, Research Student at UCL explains....
May this community be inspired by Aaron’s spirit....
This one answer to that question has been ringing through my head for a couple of days....
In this report, we examine the future of voting and the possibility of conducting secure elections online. Specifically, we explore whether End-to-End Verifiable Internet Voting (E2E-VIV) systems are a viable and responsible alternative to traditional election systems....