Pinboard (kybernetikos)
https://pinboard.in/u:kybernetikos/public/
recent bookmarks from kybernetikosUpside-Down-Ternet2024-03-18T10:18:14+00:00
https://pete.ex-parrot.com/upside-down-ternet.html
kybernetikosMy neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun.]]>network security upsidedown imagehttps://pinboard.in/u:kybernetikos/b:fd3e7c3a8850/EFF's New Wordlists for Random Passphrases | Electronic Frontier Foundation2022-06-22T08:34:24+00:00
https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases
kybernetikosJoe Bonneau dives deep into systems using dice to generate random passphrases and introduces EFF's three new wordlists.]]>security password passwords diceware wordlist word encodinghttps://pinboard.in/u:kybernetikos/b:556850449861/How to Cheat at Online Poker: A Study in Software Security | Datamation2022-03-25T10:17:53+00:00
https://www.datamation.com/applications/how-to-cheat-at-online-poker-a-study-in-software-security/
kybernetikospoker online gambling shuffle shuffling security research holdemhttps://pinboard.in/u:kybernetikos/b:c9eb34548641/PIN number analysis2017-12-19T23:07:03+00:00
http://www.datagenetics.com/blog/september32012/index.html
kybernetikosdata security statistics password pin analysis passwords numbers visualizationhttps://pinboard.in/u:kybernetikos/b:53ac3502d1b0/Hidden messages in JavaScript property names2017-07-27T13:24:47+00:00
https://www.stefanjudis.de/hidden-messages-in-javascript-property-names.html
kybernetikosRecently I came across this tweet by @FakeUnicode. It included a JavaScript snippet which looked pretty harmless but resulted in a hidden message being alerted. I took me a while to understand what's going on so I thought that documenting the steps I took could be interesting to someone.]]>javascript unicode ascii security hidden message quotehttps://pinboard.in/u:kybernetikos/b:c2a8abfce3cc/The crazy security story behind the birth of Zcash2017-07-27T13:22:09+00:00
http://spectrum.ieee.org/tech-talk/computing/networks/.WWt_NS1uwR8.hackernews
kybernetikossecurity sidechannel zcash crypto cryptocurrencyhttps://pinboard.in/u:kybernetikos/b:48bb9be0323b/The Hunting of the SNARK – QED-it2017-07-27T13:03:59+00:00
http://qed-it.com/2017/07/the-hunting-of-the-snark/
kybernetikoscrypto development encryption cryptocurrency IFTTT knowledge proof securityhttps://pinboard.in/u:kybernetikos/b:c38a4fbd9b15/Troy Hunt: Passwords Evolved: Authentication Guidance for the Modern Era2017-07-27T12:57:05+00:00
https://www.troyhunt.com/passwords-evolved-authentication-guidance-for-the-modern-era/
kybernetikosreference security password authentication passwords architecture web advicehttps://pinboard.in/u:kybernetikos/b:3b112abebb5f/"Reverse Engineering for Beginners" free book2016-07-29T13:01:21+00:00
http://beginners.re/#lite
kybernetikosbook security analysis engineeringhttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:daf41aa475b4/My First 10 Minutes On a Server - Primer for Securing Ubuntu2016-07-07T12:35:10+00:00
http://www.codelitt.com/blog/my-first-10-minutes-on-a-server-primer-for-securing-ubuntu/
kybernetikosserver linux security setuphttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:6d950d0d82d2/vox.SPACE: Being privacy-aware in 20162016-06-06T12:17:26+00:00
https://vox.space/blog/89/being-privacy-aware-in-2016
kybernetikosencryption privacy securityhttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:e49a9c4cedef/Get HTTPS for free!2016-01-30T21:48:43+00:00
https://gethttpsforfree.com/
kybernetikosfree security https webhttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:58a17854e42d/UsingTrustedRootsRespectfully | Mono2016-01-29T10:32:24+00:00
http://www.mono-project.com/archived/usingtrustedrootsrespectfully/
kybernetikossecurity mono unity httpshttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:4825626971bc/OWASP top 10 in 20132014-03-13T09:04:02+00:00
https://www.owasp.org/index.php/Top_10_2013-Top_10
kybernetikossecurity development webhttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:4464358a1d84/phantom-design-paper.pdf2014-02-05T18:44:10+00:00
http://www.magnusbrading.com/phantom/phantom-design-paper.pdf
kybernetikosinternet security phantom protocol anonymityhttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:bc8053cf13a0/Cryptography Breakthrough Could Make Software Unhackable - Wired Science2014-02-05T18:38:19+00:00
http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/all/
kybernetikoscryptography science security obfuscation program public private code secrecy zeroknowledgehttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:41d363c2e55b/The Well Deserved Fortune of Satoshi Nakamoto, Bitcoin creator, Visionary and Genius | bitslog2013-04-19T15:34:04+00:00
https://bitslog.wordpress.com/2013/04/17/the-well-deserved-fortune-of-satoshi-nakamoto/
kybernetikosdata economics money security bitcoin satoshihttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:4fe4fafbc260/Schneier on Security: Hacking the Papal Election2013-03-13T21:13:07+00:00
http://www.schneier.com/blog/archives/2013/02/hacking_the_pap.html
kybernetikoscatholic security vote election pope cardinal conclave hack analysishttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:f9aa41289879/ROSEdu Techblog - From 0 to cryptography2012-09-23T21:29:59+00:00
http://techblog.rosedu.org/from-0-to-cryptography.html
kybernetikoscrypto tutorial security cryptography encryption paint diffe helman key exchange dhehttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:ac495e62adc5/Javascript Cryptography Considered Harmful2012-09-19T13:50:54+00:00
http://www.matasano.com/articles/javascript-cryptography/
kybernetikoshttp javascript crypto cryptography security webhttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:2009ace7a664/McSweeney’s Internet Tendency: Interviews With People Who Have Interesting or Unusual Jobs: Ken Doyle, Safecracker.2012-06-03T10:44:48+00:00
http://www.mcsweeneys.net/articles/ken-doyle-safecracker
kybernetikosinterview lockpicking security lock pick safehttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:59288c3a3304/Latest news on my hardware security research2012-06-03T10:34:19+00:00
http://www.cl.cam.ac.uk/~sps32/sec_news.html#Assurance
kybernetikoschina hardware security manufacturer chip backdoor exploit debughttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:78a6a38820b4/How I Collect Passwords2012-04-27T07:34:20+00:00
http://xato.net/passwords/how-i-collect-passwords
kybernetikossecurity password google productkey key secrethttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:517157507680/Stanford Javascript Crypto Library2012-02-15T12:01:06+00:00
http://bitwiseshiftleft.github.com/sjcl/
kybernetikoscrypto cryptography javascript library security browser ecchttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:18a80976ccb0/A type-based solution to the "strings problem": a fitting end to XSS and SQL-injection holes?2012-02-07T08:28:22+00:00
http://blog.moertel.com/articles/2006/10/18/a-type-based-solution-to-the-strings-problem
kybernetikoshaskell programming security xsshttps://pinboard.in/https://pinboard.in/u:kybernetikos/b:39008ae0a7ba/How We Learned to Cheat at Online Poker: A Study in Software Security [Cigital]2010-07-06T13:03:39+00:00
https://web.archive.org/web/20080730100044/https://www.cigital.com/papers/download/developer_gambling.php
kybernetikoscards cryptography game games hack hacking math online poker programming random security statistics software shufflehttps://pinboard.in/u:kybernetikos/b:844803f8498a/CrypTool2009-06-30T13:29:27+00:00
http://cryptool.com/
kybernetikoscryptography tools security tutorial opensource crypto encryptionhttps://pinboard.in/u:kybernetikos/b:dcc3126fa8c5/IE Bug2009-02-12T08:54:18+00:00
http://www.heise.de/security/dienste/browsercheck/demos/ie/msniff/security_logo_en.jpg
kybernetikosIE security image xss bughttps://pinboard.in/u:kybernetikos/b:d8274e79ce9b/Browser Security Handbook2008-12-11T14:54:23+00:00
http://code.google.com/p/browsersec/wiki/Part1
kybernetikosdevelopment security web browser google reference bookhttps://pinboard.in/u:kybernetikos/b:43fc11769858/How to zap a camera2008-01-01T20:55:25+00:00
http://www.naimark.net/projects/zap/howto.html
kybernetikossurveillance privacy camera security laserhttps://pinboard.in/u:kybernetikos/b:05bde696b94f/iSee2008-01-01T20:45:12+00:00
http://www.appliedautonomy.com/isee.html
kybernetikossurveillance maps privacy security cctvhttps://pinboard.in/u:kybernetikos/b:8ff18c349009/Handbook of Applied Cryptography2007-12-11T22:20:50+00:00
http://www.cacr.math.uwaterloo.ca/hac/index.html
kybernetikoscryptography security book reference cryptohttps://pinboard.in/u:kybernetikos/b:0e948a2eda0f/Department of Homeland Security Blanket2007-09-22T10:01:37+00:00
http://www.slate.com/id/2172095/slideshow/2172113/
kybernetikosthreat blanket security craft vote politicshttps://pinboard.in/u:kybernetikos/b:c9c5d1bca460/The MIT Guide to Lockpicking2006-10-14T08:19:01+00:00
http://www.capricorn.org/~akira/home/lockpick/index.html
kybernetikoslockpicking locks tutorial securityhttps://pinboard.in/u:kybernetikos/b:db6c6c6613dc/Tiger Envelopes2006-09-18T14:12:12+00:00
http://www.tigerprivacy.com/
kybernetikosemail encryption securityhttps://pinboard.in/u:kybernetikos/b:b12380b06a93/Schneier on Security2006-09-05T21:52:03+00:00
http://www.schneier.com/blog/
kybernetikosbruceschneier security cryptography encryption bloghttps://pinboard.in/u:kybernetikos/b:7c599efb3856/17 Mistakes Microsoft Made in the Xbox Security System - Xbox-Linux2006-09-05T16:48:38+00:00
http://www.xbox-linux.org/wiki/17_Mistakes_Microsoft_Made_in_the_Xbox_Security_System
kybernetikossecurity xbox microsoft hacking mistakes cryptographyhttps://pinboard.in/u:kybernetikos/b:461d690ad7a4/