totpunk: security

Sort by: Date / Title / URL

  1. 21-06-2013 to , , and -1 others
  2. 13-05-2013 to , , and -1 others
  3. 02-03-2013 to , and -1 others
  4. 31-01-2013 to , , and -1 others
  5. aeGis is an OSS alternative to other security apps that interact via SMS.aeGis allows you to lock, locate, wipe, and alarm your phone via configurable SMS passphrases.
    16-01-2013 to , and -1 others
  6. LittleBlackBox is a collection of thousands of private SSL and SSH keys extracted from various embedded devices. These private keys are stored in a database where they are correlated with their public certificates as well as the hardware/firmware that are known to use those private keys.
    22-10-2012 to , , , and -1 others
  7. P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way.
    11-01-2012 to , , and -1 others
  8. The Android developer who raised the ire of a mobile-phone monitoring company last week is on the attack again, producing a video of how the Carrier IQ software secretly installed on millions of mobile phones reports most everything a user does on a phone.
  9. While smartphones have been heralded as the coming of the next generation of communication and collaboration, they are a step backwards when it comes to personal security, anonymity and privacy. The Guardian Project aims to create easy to use apps, open-source firmware MODs, and customized, commercial mobile phones that can be used and deployed around the world, by any person looking to protect their communications and personal data from unjust intrusion and monitoring.
    05-09-2011 to , , and -1 others
  10. Advanced persistent threat (APT) usually refers to a group, such as a foreign nation state government, with both the capability and the intent to persistently and effectively target a specific entity. The term is commonly used to refer to cyber threats, in particular that of Internet enabled espionage, but applies equally to other threats such as that of traditional espionage or attack.
    08-08-2011 to and -1 others

First / Previous / Next / Last / Page 3 of 14