It’s getting harder to hide

As I have often said, we all require different levels of security. Those of you that are just putting it about and don’t want the other half to find out will need less than someone doing their final year at Super Secret Spy School. Nevertheless, the philanderer can always benefit from the extra knowledge they pick along the


In cryptography, RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4) is the most widely used software stream cipher and is used in popular Internet protocols such as Transport Layer Security (TLS). RC4 Wireless provides wireless lighting and motion technology for theatre, film, and television. Schneier on Security has an interesting

These stories are not related

Hire a hacker Last November, Charles Tendell quietly launched a website called Hacker’s List. Its name was literal. In this online marketplace, white-hat security experts could sell their services in bite-size engagements to people with cyber-problems beyond their grasp. Logistically, Hacker’s List acts as a sort of reverse-eBay: customers post projects, then “hackers” bid on them. The customer

Just another [bad] news day

Researchers Hack Air-Gapped Computer Or do they? Researchers in Israel have devised a new method for stealing data that bypasses all of these protections—using the GSM network, electromagnetic waves and a basic low-end mobile phone. The researchers are calling the finding a “breakthrough” in extracting data from air-gapped systems. The attack requires both the targeted

Zero day sales

The underground market for zero-day exploit sales has long been a hidden dark alley to anyone but the hackers and sellers who call it home. But the recent hack of the Italian spyware maker Hacking Team, and the subsequent dump of 400 gigabytes of its internal emails, has shone a bright light on the nature


HORNET, a proposed anonymizing network architecture based on an “onion routing” approach similar to Tor, could be much faster and integrated directly into Internet infrastructure, say its authors. Like Tor, HORNET encrypts encapsulated network requests in “onions” — with each layer being decrypted by each node passing the traffic along to retrieve instructions on where

The Patriot Act

The USA PATRIOT Act is an Act of Congress that was signed into law by President George W. Bush on October 26, 2001. Its title is a ten-letter backronym (USA PATRIOT) that stands for “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001″. from the let-no-tragedy-go-unexploited department

What is a Root SSL Certificate?

What is the SSL Certificate Chain? There are two types of certificate authorities: root CAs and intermediate CAs. In order for an SSL certificate to be trusted, that certificate must have been issued by a CA that is included in the trusted store of the device that is connecting. If the certificate was not issued


Sandboxie Sandbox security software for Windows. Install and run programs in a virtual sandbox environment without writing to the hard drive. What is Sandboxie and how is it different than other solutions? Think of your PC as a piece of paper. Every program you run writes on the paper. When you run your browser, it

Tech Innovation & Bitcoin

As I have already posted, there are problems with using Bitcoin. But, it has achieved the status of being the most recognizable and influential digital currency on the market. And we need a viable international  digital currency that does not reveal our identity. A Load&Go Reloadable Visa Prepaid Card may be ok for use in Australia, but it

Full delete

Life is short. Have an affair. Tell the world about it – oops. The data released by the hackers — which self-identify as The Impact Team — includes sensitive internal data stolen from Avid Life Media, the Toronto-based firm that owns AshleyMadison as well as related hookup sites Cougar Life and Established Men. Besides snippets of account

Australia’s data retention

Australian carriers and internet service providers (ISPs) will be required to retain data on their customers as of October 13th, 2015. But just how they’ll access the cash Australia’s government has made available to do the retention is still unknown. There’s a sliver of good news in the announcement, as its possible for carriers and

Found you with WebRTC

WebRTC (Web Real-Time Communication) is an API definition drafted by the World Wide Web Consortium (W3C) that supports browser-to-browser applications for voice calling, video chat, and P2P file sharing without the need of either internal or external plugins. In January 2015, TorrentFreak reported that browsers supporting WebRTC suffer from a serious security flaw that compromises

Using Secure Chat

We have installed Orbot and connected to the Tor network on Android, and we have installed ChatSecure and created an anonymous secret identity Jabber account. We have added a contact to this account, started an encrypted session, and verified that their OTR fingerprint is correct. And now we can start chatting with them with an

Crypto attacks against HTTPS

Almost a third of the world’s encrypted Web connections can be cracked using an exploit that’s growing increasingly practical, computer scientists warned Wednesday. The attack could be exploited by attackers with the ability to monitor the connection between a target and an HTTPS-protected website or WPA-TKIP-protected network. In the case of an HTTPS-protected website, the