Posted by david b.
on August 20, 2014
Peiter C. Zatko, aka Mudge, a well-known former member of the L0pht and ex-researcher at DARPA, tells a few stories from his past experience at Defcon.
Just so we’re clear, I’m only speaking as myself today. I am not a representative of the U.S. Government; I am not a representative of my current...
Posted by david b. on August 8, 2014
Winding up with the Defcon talk, Chris Soghoian highlights the merits of the companies that focus on user data security rather than usability only.
The FBI has this team of agents who are doing nothing but...
Posted by david b. on August 3, 2014
ACLU’s Chris Soghoian now delves into how he discovered the activities of contractor company employees supporting the Government’s hacking endeavors.
What about the Feds?
The feds have the big bucks, federal law...
Posted by david b. on August 1, 2014
Chris Soghoian’s focus in this entry is on private sector companies providing assistance to the government by developing tools for intercepting communications.
Alright, so if they can’t force...
Posted by david b. on July 28, 2014
Chris Soghoian zeroes in on the government’s attempts to circumvent privacy measures by the Silicon Valley companies that all came to employ encryption.
Silicon Valley vs. telco surveillance
What we have seen in the...
Posted by david b. on July 24, 2014
Delving further into crypto evolution, Chris Soghoian focuses on the relationship between law enforcement and companies that adopted strong privacy algos.
And so, things were good for a while. It didn’t...
Posted by David Balaban on July 23, 2014
Omiga Plus by Taiwan shui Mu Chih Ching Technology, Inc. is a desktop maintenance application that merges the useful with the intrusive. What’s handy about it is the feature of organizing the desktop in a way that...
Posted by david b. on July 22, 2014
Christopher Soghoian, ACLU’s Principal Technologist, presents his study at Defcon highlighting the past and the present of the privacy and cryptography realm.
Good morning or good afternoon, my name is Chris...
Posted by david b. on July 18, 2014
Having overviewed antivirus evasion methods that didn’t turn out too efficient, David Maloney now describes some successful approaches that he came up with.
We are not going to use stagers anymore, that is to say, we...