asteroza + protection + security   60

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recog...
Using tweaked glasses which present some fake facial features due to overlay on the thick frame, it might be possible to adversarially fool face recognition systems (potential "I am Sparticus" effect) but the researchers cheated a bit and did the overlay glasses on an existing picture, rather than live humans wearing real defensive glasses.
adversarial  privacy  protection  defense  anonymity  face  recognition  glasses  overlay  attack  exploit  security  research  image  Delicious 
november 2016 by asteroza
CryptoPrevent Malware Prevention – Foolish IT
Not perfect, but a reasonable last line of defense for ransomware like CryptoLocker
ransomware  malware  protection  defense  software  antivirus  security  Delicious 
may 2016 by asteroza
SyncStop, USB Condoms - Protect your mobile phone from accidental syncing and malware!
Blocking the data pins usually also blocks negotiating higher charge speeds. But, apparently this will protect against the USB killer power surge attack dongle.
SyncStop  USB  condom  power  charge  recharge  adapter  hardware  electronics  devices  security  data  block  sync  blocking  dongle  protection  Delicious 
june 2015 by asteroza
Computer Laboratory: BERI open-source hardware downloads
CHERI is built on the MIPS ISA, but concepts are portable to RISC-V and ARMv8.
CHERI  BERI  secure  processor  FPGA  softcore  opensource  hardware  CPU  design  security  memory  protection  Delicious 
july 2014 by asteroza
Tries to force a full disk encryption laptop into hibernation to try to purge encryption keys from RAM before someone tries to do a DMA or cold boot attack to retrieve keys, provided a power or network state change event can be reliably detected...
windows  bitlocker  security  encryption  cryptography  defense  protection  automatic  hibernation  system  change  event  trigger  key  management  YoNTMA  software  opensource  full  disk  FDE  forced  purge  power  network  Delicious 
may 2014 by asteroza
The Kitchen Safe
The Kitchen Safe is the time-lock container that puts you in charge.
protection  hardware  tricks  locking  lock  security  kitchen  access  child  time  timer  container  prevention  tips  locked  devices  electronics  storage  Delicious 
june 2013 by asteroza
TagMeNot privacy: no face recognition, don't tag, blur my face.
Needs some critical mass of users to get the necessary uptake, but conceptually this isn't a bad idea. There is the issue of the marker code being legible enough for OCR/QRcode detection software to detect. This puts a limit on the data payload/complexity of the tag, since if viewed from far away, the QRcode wouldn't be decodable, despite detecting that a QRcode of some kind is present.
QRcode  privacy  marker  image  tag  identity  opt-out  face  recognition  security  mark  sign  protection  defense  TagMeNot  Delicious 
june 2011 by asteroza
CV Dazzle by Adam Harvey
Makeup/camouflage patterns that deliberately breakup facial profiles can confuse machine vision systems searching for faces or trying to make biometric matches based on faces. A useful technique for protesters in first world countries employing CCTV surveillance.
CVdazzle  CV  dazzle  camouflage  CCTV  facial  recognition  defense  hack  counter  face  detection  art  privacy  security  hacking  protest  activism  protection  anonymity  opencv  fashion 
march 2011 by asteroza
Apparently a decent hosts file to protect you from the less reputable parts of the intarwebs...
hosts  file  antivirus  antimalware  antispyware  antiadware  security  privacy  protection  localhost  redirect  Delicious 
november 2010 by asteroza

related tags

512MB  access  accesspoint  activism  ad  adapter  addon  address  adobe  adversarial  advertising  AI  alarm  alert  alternative  anonymity  anonymizer  antiadware  antiDDoS  antiexploit  antikeylogger  antimalware  antiphishing  antiransomware  antiRFID  antisnooping  antispam  antispyware  antivirus  apache  apparel  appliance  architecture  armor  art  Asirra  attack  auditing  authentication  automatic  badge  baseball  BERI  bitlocker  blast  block  blocking  bluetooth  body  boot  bot  brain  browser  brute  buffer  building  bypass  C#  cage  camouflage  Canon  cap  captcha  CCTV  change  channel  charge  chattr  CHERI  child  chrome  clothing  cloud  cold  comment  compliance  condom  configuration  connection  Connexion2  construction  consumer  container  content  control  cookie  copy  counter  CPU  credit  cryptography  CSRF  currency  CV  CVdazzle  cyberrnetics  Dan  data  dazzle  DDoS  defense  defensive  deletion  Delicious  design  detection  development  device  devices  dictionary  DIFRwear  disabling  disaster  disk  DMA  DNS  DNSwall  document  dongle  DoS  download  draft  dragnet  drive  DRM  elastic  electronics  email  emergency  emulation  enclave  encrypted  encryption  endpoint  Enova  Enovatech  escape  Esphion  ethernet  ethics  event  evercookie  exploit  ext2  ext3  extension  fabric  face  facial  factor  Fail2ban  faraday  fashion  FDE  fight  file  filesystem  filevault  finance  firefox  firewall  firewire  FlagStone  flash  flood  force  forced  form  FPGA  framework  fraud  full  glasses  graphic  guardian  guide  hack  hacking  hard  hardware  HCI  headset  health  Heap  helmet  hibernation  hosts  howto  HTML  http  ID  idendtity  Identicom  identification  identity  IETF  image  immutable  implant  infection  information  injection  inline  input  insert  intel  Interpolique  iptables  Janus  JanusPA  japan  javascript  Kaminski  key  keycode  keylogger  keyword  kitchen  kittenauth  laptop  lcap  lifehacks  Lifelock  lighttpd  limited  linux  localhost  lock  locked  locking  logging  lone  mac  malware  management  mark  marker  mat  materials  medical  memory  mesh  mGuard  microsoft  military  mitigation  MitM  mod  module  mod_evasive  money  monitoring  network  neural  neuro  neuroscience  neurosecurity  nevercookie  New  notebook  nozzle  obfuscated  obstcp  OCR  office  online  opencv  opensource  openssh  openVPN  opportunistic  OPSEC  opt-out  OSX  overflow  overlay  overwrite  packet  page  panic  paranoia  password  passwordless  patching  PC  pentesting  perl  personal  phishing  photo  photoshop  php  picture  plastic  plugin  polymer  portable  power  preboot  prevention  print  printing  privacy  processor  programming  protected  protection  protective  protest  protocol  proxy  purge  python  QRcode  ransomeware  ransomware  RAP  rebind  recharge  recognition  recording  redirect  reduction  reference  reinforcement  remediation  report  research  retrofit  return  rewrite  RFC  RFID  ROP  router  rule  safety  scanning  science  script  SECUDE  secure  security  server  service  setting  setup  SGX  side  sign  skimming  small  sniffing  snitch  softcore  software  solution  spam  spamcube  spoofing  SQL  ssh  sshguard  SSL  SSRF  Stonewood  storage  strikeforce  surface  SYN  sync  SyncStop  sysadmin  system  tag  TagMeNot  tap  tcp  technology  theft  time  timer  tips  TLS  tools  Tor  tracker  tracking  training  tricks  trigger  tutorial  two  Uniflow  URL  USB  utilities  utlities  VB  visual  wall  wallet  web  webdev  whole  wifi  windows  winlockpwn  wireless  wiretapping  worker  X-Flex  YoNTMA  Zealand 

Copy this bookmark: