[FD] The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users | WIRED

2014-12-18 Thread Ivan .Heca
Get free programming and development from OS community http://www.wired.com/2014/12/fbi-metasploit-tor/ ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclos

[FD] 81% of Tor users can be de-anonymised by analysing router information, research indicates

2014-11-17 Thread Ivan .Heca
http://thestack.com/chakravarty-tor-traffic-analysis-141114 ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] Former NSA Chief: Why I'm Worth $1 Million a Month to Wall Street

2014-07-29 Thread Ivan .Heca
Nice coin. Behavioral model predictions sounds like BS Former NSA Director Keith Alexander says his services warrant a fee of up to a million dollars, due to a cyber-surveillance technique he and his partners at his new security firm IronNet Cybersecurity have developed, Foreign Policy reported on

Re: [FD] Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government | PandoDaily

2014-07-24 Thread Ivan .Heca
worms. > > > On Wed, Jul 16, 2014 at 5:10 PM, Ivan .Heca wrote: > > > Funding doubled, so engineering some back doors? > > > > In 2012, Tor nearly doubled its budget, taking in $2.2 million from > > Pentagon and intel-connected grants: $876,099 came from the

Re: [FD] Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government | PandoDaily

2014-07-17 Thread Ivan .Heca
his > automatically mean it's backdoored then? Could someone insert a backdoor > into open-source software? Yes. Funding sources do little to change this. > Now, who is controlling exit nodes is a different story, but that's another > can of worms. > > > On Wed, J

[FD] Peeling the onion: Almost everyone involved in developing Tor was (or is) funded by the US government | PandoDaily

2014-07-17 Thread Ivan .Heca
Funding doubled, so engineering some back doors? In 2012, Tor nearly doubled its budget, taking in $2.2 million from Pentagon and intel-connected grants: $876,099 came from the DoD, $353,000 from the State Department, $387,800 from IBB. That same year, Tor lined up an unknown amount funding from

[FD] Computer hackers face life in prison under new Government crackdown on cyber terrorism | Mail Online

2014-06-05 Thread Ivan .Heca
http://www.dailymail.co.uk/news/article-2649452/Computer-hackers-face-life-prison-new-Government-crackdown-cyber-terrorism.html?ITO=1490&ns_mchannel=rss&ns_campaign=1490 ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/f

[FD] Is Your Antivirus Tracking You? You'd Be Surprised At What It Sends

2014-06-03 Thread Ivan .Heca
http://www.makeuseof.com/tag/antivirus-tracking-youd-surprised-sends/ ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] US cybercrime laws being used to target security researchers | Technology | The Guardian

2014-05-29 Thread Ivan .Heca
HD Moore, creator of the ethical hacking tool Metasploit and chief research officer of security consultancy Rapid7, told the Guardian he had been warned by US law enforcement last year over a scanning project called Critical.IO, which he started in 2012. The initiative sought to find widespread vul

Re: [FD] heartbleed OpenSSL bug CVE-2014-0160

2014-04-11 Thread Ivan .Heca
to be fair to Bruce, here is his entire post on the subject https://www.schneier.com/blog/archives/2014/04/heartbleed.html On Fri, Apr 11, 2014 at 4:32 PM, Paul Vixie wrote: > > > Paul Vixie wrote: > > Michal Zalewski wrote: > >>> > http://m.smh.com.au/it-pro/security-it/man-who-introduced-ser

Re: [FD] heartbleed OpenSSL bug CVE-2014-0160

2014-04-10 Thread Ivan .Heca
In what appears to be his first comments to the media since the bug was uncovered, Robin Seggelmann said how the bug made its way into live code could "be explained pretty easily". http://m.smh.com.au/it-pro/security-it/man-who-introduced-serious-heartbleed-security-flaw-denies-he-inserted-it-deli