Signed Malware
I recently saw a quote on Twitter along the lines of "I couldn't be in threat intel because I'd get too carried away, go too far, and end up calling some hacker's mom." I had to laugh since I can...
View ArticleWindows 10 Decontamination Scripts
Recently my personal laptop fell on some hard times and had to be sent to the laptop retirement home. The one hesitation I had with getting a new one was dealing with Windows 10. It has some security...
View ArticleInterface Identifier (IID) list
Interface Identifiers (IID's) are used to obtain function tables to call most methods of COM objects. In source code, a name like IID_Column will be used, but when this is compiled, the binary will...
View ArticleShould there be restrictions on the release of hacking tools?
This is a text outline of the interactive version available here 1.1. No. Authors of such software should decide for themselves what the best release policy should be 1.1.1. Pro: Authors of security...
View ArticleDispelling Decentralization Doubts
Recently at the 36th CCC, Moxie Marlinspike gave a talk titled "the ecosystem is moving" defending his choice to centralize Signal, claiming decentralized systems are unable to adapt and succeed and...
View ArticleStream Securely: Simply and Privately Preserving Live Video Evidence
Cell phone video has been a major game changer for society. While most cell videos are just for fun, some have also been critical as evidence to document acts of aggression, violence, and other...
View Articlerustun – Virtual Not Private Network in 100 Rust lines
While stuck at home I wrote a simple Linux tunnel ("VPN" but not encrypted/authenticated) in 100 lines of Rust. This is a PoC, not an OpenVPN replacement; just sending the IP layers and above over...
View ArticleMoving Off Google
Not long ago, a well-known games developer posted the following horror story: I have used and been burned by a number of Google services over the years but certainly didn't think that attitude would...
View ArticleCovert credit calculation communications
Record numbers of people have been in the market for a house this past year. Now working at home, I also bought a house, with an office. Finding one in this market was frenzied, but I spent as much...
View Articleschadnfreude
You'll be happy when they can't spy on you. 🖧 Schadnfreude is a new end-to-end encrypted, anonymous ID and IP-hiding, decentralized, audio/video/file sharing/offline messaging multi-device platform...
View Article