BlogHide Resteemsf1f1cin (25)in blockchain • 6 years agoBreaking the Hyperledger - Part 1: Significance/Defense (Non-Technical)Introduction and Defense of Significance The Hyperledger Project is a project of the Linux Foundation focusing on the application of blockchain technology at a global commercial scale that is…f1f1cin (25)in interlude • 6 years agoWe're All Mad HereAfter running across $11 trillion in credit default swap securities, I gave up. Wanda, Cisco, Oracle, IBM... things are getting complicated. We're all criminals. Aren't we? I'm having trouble…f1f1cin (25)in surveillance • 7 years agoData Exfiltration on a Mass ScaleAs if we weren't already living in a dystopian non-fiction... The Idea Initial Thought Phone data exfiltration using receive-only SDRs. That's it. That's the thought that started it all. I was…f1f1cin (25)in defcon • 7 years agoDEFCON China 2018 - The RundownThe Disclaimers 1. I am a n00b. blehhhhhhhhh. I guess I was among the youngest people involved behind the scenes (possibly the youngest). 2. I have never been to DC Proper (Las Vegas), so I can't…f1f1cin (25)in ai • 7 years agoPill = (Robot > Human) ? Red : Blue;News channels, Buzzfeed, unnecessarily long Twitter threads - they all provide a constant reminder on what values the general (American, for the purpose of this writing) population places on…f1f1cin (25)in aerospace • 7 years agoAerospace x Security: A Project of Human AugmentationA conglomeration of senseless ideas that might eventually turn into something useful. Introduction There is a particular company that is becoming increasingly concerned with the intersection of…f1f1cin (25)in technology • 7 years agoCyber GuerrillaNote: I really dislike the word “cyber” but I’m not sure what else to use, so it will have to do. Something interesting has been popping up in security-oriented newsletters lately.…f1f1cin (25)in network • 7 years agoThe Misconception of Hacking (2)After over a week-long break, here is the networks part of the series. Network-Based Hacking Network hacking usually involves a lot of probing and spoofing. Unlike malware-dependent hacking or…f1f1cin (25)in hacking • 7 years agoThe Misconception of HackingPeople will call almost anything a hack when they don't have a more practical explanation. Kernel panic (BLUE SCREEN OF DEATH) when you had 100+ tabs open? Definitely a hack. Definitely not a memory…f1f1cin (25)in malware • 7 years agoThoughts on the Cyber Attack on the Winter Olympics:Thoughts on the Attack on the Winter Olympics: The olympics winter games officials confirmed a cyber attack yesterday (Sunday Feb. 11). Normally, you would expect attacks to have some aim to gain…