Quantcast
Channel: Security – Bi·lak
Browsing all 25 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Twitter: TextSecure baked into CyanogenMod

Nice! @CyanogenMod and @whispersystems cooperating to bring encrypted SMS/secure messaging to the masses. https://t.co/edkHuhq6ZS — Riyad Preukschas (@riyadpr) December 9, 2013 Post on the CyanogenMod...

View Article



Image may be NSFW.
Clik here to view.

Hillariously embarrassing “cyber expert”

How this “cyber expert” embarrasses herself is priceless. I laughed so hard my stomach hurts. xD The post Hillariously embarrassing “cyber expert” appeared first on Bi·lak.

View Article

Image may be NSFW.
Clik here to view.

Dell Regrets The “Inconvenience”

riyad Did you buy a #Dell server with a #NSA backdoor? Dell "regrets the inconvenience". https://twitter.com/DellCares/status/417812096072818688 31. December 2013 The post Dell Regrets The...

View Article

Image may be NSFW.
Clik here to view.

justdelete.me

Just Delete Me – Find out how to delete your account on a service you don’t want to be on any more. … Did somebody say Facebook? The post justdelete.me appeared first on Bi·lak.

View Article

Image may be NSFW.
Clik here to view.

Passwörter und Fingerabdrücke mittels Smartphone abfilmen

Forscher der TU Berlin haben herausgefunden, dass die Frontkameras von Smartphones so gut auflösen, dass man an den Reflexionen in den Augen oder Brillen Passwörter auslesen kann. Außerdem gelang es...

View Article


Image may be NSFW.
Clik here to view.

Choosing Comfort Over Privacy

It looks like Apple “needs” to upload even your unsaved documents to its servers to make the newly introduced Continuity “feature” work. Also it seems Apple silently uploads names and email addresses...

View Article

Image may be NSFW.
Clik here to view.

They Don’t Care About Your “Online” Privacy

Messenger apps show your friends’ online status. Anytime you open the app, they’ll notify the service that you’re “online” at the moment. Now everybody else can see it in their contact lists. And with...

View Article

Image may be NSFW.
Clik here to view.

Privacy Consequences of the SPE Hack

Bruce Schneier in his comments on the recent Sony Hack cites a Gizmondo article that sums it up very well why privacy is important to everyone even for mundane everyday stuff we do on the internet:...

View Article


Image may be NSFW.
Clik here to view.

No, You Go First

Bruce Schneier talks about how security companies sat on knowledge and research data about military-grade Regin malware for at least six years. They only decided to share their knowledge because the...

View Article


Image may be NSFW.
Clik here to view.

Security Fence

Security Fence by Clay Bennet The post Security Fence appeared first on Bi·lak.

View Article

Image may be NSFW.
Clik here to view.

New RC Cars

What’s so new about RC cars? Oh … they’re the real, “off-the-shelve” ones, those where people ride in … and they can be hijacked by anybody with the same cellular provider … over the Internet, no...

View Article

Image may be NSFW.
Clik here to view.

Encrypt All Your Devices

Ars Technica has compiled a guide for how to encrypt laptops and phones. There are brief descriptions for all the relevant systems. The post Encrypt All Your Devices appeared first on Bi·lak.

View Article

Image may be NSFW.
Clik here to view.

NSA’s MITM attack on Cryptome

The moment you find out the NSA is performing MITM attacks on your website’s visitors from a leaked slide deck: But here is the thing — and this is crucial — the address for Cryptome is listed to be...

View Article


Image may be NSFW.
Clik here to view.

CFSSL FTW

After reading how CloudFlare handles their PKI and that LetsEncrypt will use it I wanted to give CFSSL a shot. Reading the project’s documentation doesn’t really help in building your own CA, but...

View Article

Image may be NSFW.
Clik here to view.

Leaky Apps

How much data are the most popular apps on Android and iOS leaking to third parties (i.e. people who have nothing to do with the app you’re using). A LOT! The post Leaky Apps appeared first on Bi·lak.

View Article


Image may be NSFW.
Clik here to view.

Ramen Code

The plaintiffs in Toyota’s Unintended Acceleration lawsuit had someone with knowledge in building embedded software had a look at Toyota’s source code: possible bit flips, task deaths that would...

View Article

Image may be NSFW.
Clik here to view.

Data Is A Toxic Asset

Bruce Schneier also finds data is actually a toxic asset. 😶 The post Data Is A Toxic Asset appeared first on Bi·lak.

View Article


Image may be NSFW.
Clik here to view.

TSA’s Random Lane Picker

This is so moronic I almost fell off my chair laughing: it seems like the TSA spent $47,000 on a “random lane picker.” Please, you be the judge whether it was worth it: It needs to be operated manually...

View Article

Image may be NSFW.
Clik here to view.

WhatsApp End-to-end Encryption

WhatsApp just announced they enabled end-to-end encryption for all their users … this is huge news. They have put a white paper up describing their implementation. Good news: it’s based on the Signal...

View Article

Image may be NSFW.
Clik here to view.

What Mafia Teaches Us About Trust & Security

David Eaves has some interesting thoughts on what Mafia can tell us about trust and security. He also has a few ideas on how the physical game setup gives advantage to different parties. The post What...

View Article
Browsing all 25 articles
Browse latest View live




Latest Images