Home - Suricata
Data Safety and Information Security
Compliance As Property
In engineering, a common approach to security concerns is to address those requirements after delivery. This is inefficient for the following reasons: Fails to consider how the requirement(s) can b…
Digital Memories
Digital memories are an important component of our digital embodiment. SSI provides a foundation for self-sovereign digital memories to solve the digital-analog memory divide.
Web trust dies in darkness: Hidden Certificate Authorities undermine public crypto infrastructure
Boffins measure the black hole of dubious certs and find it troubling
rfc2522
Photuris: Session-Key Management Protocol (RFC )
Trusting trust, the unsolved security problem
What is the trusting trust problem?
Schneier on Security, Countering "Trusting Trust"
Way back in 1974, Paul Karger and Roger Schell discovered a devastating attack against computer systems. Ken Thompson described it in his classic 1984 speech, “Ref...
Essentials for Integrating Identity - The New Stack
When first integrating your apps with an IAM system, there is a learning curve to identify and meet the important requirements.
Zero Knowledge Proofs
Zero-knowledge proofs are a powerful cryptographic technique at the heart of self-sovereign identity (SSI). This post should help you understand what they are and how they can be used.
Cold War CIA Tradecraft - Schneier on Security
Central Intelligence Agency - CIA
Tolkachev, A Worthy Successor to Penkovsky: An Exceptional Intelligence Operation - Tolkachev-Successor-Penkovsky.pdf
Operations Subject Index - CIA
Secret CIA 'Magic' Manual Reveals Cold War Spy Tricks
In the early 1950s, a prominent magician wrote a top-secret manual of "trickery and deception" for the C.I.A.
Language of Espionage
Learn spy terms, phrases, and code words with the International Spy Museum. Put in the work here and you’ll be using spy lingo in no time.
SPYSCAPE Tradecraft: The insider's view from the CIA, KGB, Mossad and more
Tradecraft: The CIA, KGB, Mossad and More
Tools of Tradecraft: The CIA's Historic Spy Kit
Password manager using age for encryption
Quickly discover and collect indicators of compromise from millions of sources
Leo recognizes IoCs mentioned in articles, and can gather them for you
Smuggling hidden backdoors into JavaScript with homoglyphs and invisible Unicode characters
Researchers urge developers to secure code by disallowing non-ASCII characters
Securing your digital life, part two: The bigger picture—and special circumstances
We did the basics—now let's look at some more detailed steps to protect yourself.
Securing your digital life, part one: The basics
In this first of two parts, we go over some security steps everyone should be taking.
Fides Open Source
Data privacy software for businesses. Fides is a suite of open-source devtools and data tools for developers and privacy teams.
Get a Handle on Software Supply Chain Security with LFX - The New Stack
The Linux Foundation has introduced LFX Security, a new tool to help secure software supply chains. It scans for vulnerabilities using Synk's open source security platform and looks for secrets-in-code and non-inclusive language using BluBracket's automatic scanning functionality.
The Booming Underground Market for Bots That Steal Your 2FA Codes
The bots convincingly and effortlessly help hackers break into Coinbase, Amazon, PayPal, and bank accounts.
Signatures: The secret behind modern end-to-end encryption
Now that most of our communications are digital, a problem arises: How to keep our messages private despite all the intermediaries? Internet Service Providers (ISPs) and Service providers (Facebook, Telegram, Line, WeChat…) are all in a position of Man-In-The-Middle (MITM) and are able to inspect, record, and even modify our communications without our consent or knowledge.
And this is before talking about malicious actors.
ISP - service provide (ex: Chat) - ISP - Bob -- You may think that you have nothing to hide, so it doesn’t matter.
Imperceptible Perturbations
EBCDIC is incompatible with GDPR
Welcome to acronym city! The Court of Appeal of Brussels has made an interesting ruling. A customer complained that their bank was spelling the customer’s name incorrectly. The bank didn̵…
Sequoia-PGP
Sequoia is a modular OpenPGP implementation in Rust.
Top 16 open source intelligence tools (OSINT) to find anyone online
What are the top 16 open source intelligence tools (OSINT) ever made? find anyone online and offline with these tools, hints and tips.
Which browsers are best for privacy?
An open-source privacy audit of popular web browsers.