opsec   897

« earlier    

Home - MySudo
We created Sudo to put safety and privacy back in your hands - Added April 11, 2018 at 08:06PM
opsec  security 
20 days ago by xenocid
That One Privacy Site | Welcome
Redirecting - Added April 11, 2018 at 08:04PM
opsec  security 
20 days ago by xenocid
The CORE Group | The CORE Group
If you suspect covert entry has taken place, we can help you investigate. Our forensic experts can analyze and assess suspect security seals for signs of tampering or compromise. via Pocket
IFTTT  Pocket  locks  opsec  physical 
20 days ago by ChristopherA
A Modest Privacy Protection Proposal – Jameson Lopp – Medium
It’s hard to retain much privacy in the information age — the Internet has a nearly perfect limitless memory and we’re placing a ton of sensitive data onto it. After being swatted in 2017, I set out on a mission to start my life over with a renewed focus on privacy. via Pocket
IFTTT  Pocket  identity  opsec  personal  privacy  security 
20 days ago by ChristopherA
How to Catch when Proxies Lie
Internet users worldwide rely on commercial network proxies both to conceal their true location and identity, and to control their apparent location. Their reasons range from mundane to security-critical. Proxy operators offer no proof that their advertised server locations are accurate. IP-to-location databases tend to agree with the advertised locations, but there have been many reports of serious errors in such databases. In this study we estimate the locations of 2269 proxy servers from ping-time measurements to hosts in known locations, combined with AS and network information. These servers are operated by seven proxy services, and, according to the operators, spread over 222 countries and territories. Our measurements show that one-third of them are definitely not located in the advertised countries, and another third might not be. Instead, they are concentrated in countries where server hosting is cheap and reliable (e.g. Czech Republic, Germany, Netherlands, UK, USA). In the process, we address a number of technical challenges with applying active geolocation to proxy servers, which may not be directly pingable, and may restrict the types of packets that can be sent through them, e.g. forbidding traceroute. We also test three geolocation algorithms from previous literature, plus two variations of our own design, at the scale of the whole world.
proxy  geolocation  opsec 
29 days ago by nmh
extreme-opsec-for-the-modern-cypherpunk
Jameson is the infrastructure engineer at Casa. Please welcome Jameson Lopp. Hi fellow cypherpunks. We're under attack. Corporations and nation states in their quest for omniscience have slowly stripped away our privacy. We are the frog being boiled in the pot called progress. via Pocket
IFTTT  Pocket  opsec  personal  privacy 
4 weeks ago by ChristopherA
gitleaks searches full repo history for secrets and keys 🔑 | News and podcasts for developers | Changelog
gitleaks searches full repo history for secrets and keys ? - Added February 21, 2018 at 02:12PM
opsec  security 
7 weeks ago by xenocid

« earlier    

related tags

#fail  #opsecfail  2018  @krls  @thegrugq  adtech  adversaries  advertising  analysis  android  anonymity  art  attack  best.practices  biometrics  bitcoin  blur  breaches  catalunya  cbs  cellphone  cia  cocktail  collaboration  commentary  corruption  cpu  crime  crypto  cryptography  cyber  cybersecurity  dark-web  data.mining  data  datasec  deception  defcon  density  design  devmachine  email  encryption  espionage  examples  facebook  facialrecognition  finance  fraud  free  from:foreignpolicy  funny-tweets  gdpr  geolocation  google  gps  graphic  grugq  hacking  hardware  hide  history  hollywood  horrorstories  hosting  howto  hsu  huge-data-the-biggest  humor  hyperthreading  identity  ideology  ifttt  inference  infosec  insiderthreat  intel  it_sicherheit  jigsaw  journalism  kanye-west  khashoggi  kimtrumpsummit  labor  language  links  location  lockpicking  locks  lulz  manafort  marketing  mask  max  metadata  militarism  mobile  mossad  motivational  neoliberalism  network-structure  no2id  nsa  occupational  open-closed  openbsd  orgbehavior  osint  paranoia  pentesting  personal  phishing  phones  photo  photocopiers  phototools  physical  physical_security  pocket  police  politics  poster  practical  privacy  privsec  proxy  psyops  puzzles  read2of  reference  referendum  resources  retro  scitariat  secret  security  securityquestions  sicherheit  signal  slides  social_media  social_networks  socialmedia  spatial  speculation  spooks  ssh  startups  story  surveillance.capitalism  surveillance  swat  tech  technology-industry  technology  teens  telegram  thegrugq  threat-modeling  time  tlb  tools  toolstouse  tor  tracking  trump  trust  tweet  tweets  twitter  us  usa  usb  vpn  whatsapp  whitehat  whitehouse 

Copy this bookmark:



description:


tags: