Proper Planning and Preparation Prevents Piss Poor Penetrations I was asked for good references on pre-operation phases of hacking. I recommended Matt Monte’s “network attacks and exploitation: a framework”, and Bill McRaven’s “Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice”. The Monte book is the best book on cyber written so far. […]
How to hide money laundering on the blockchain
This is a summary of the key points from this article: How to Not Get Caught When You Launder Money on Blockchain? Seems like successfully laundering Bitcoins is fairly complicated, lots of pitfalls. Secrecy is usually binary, it is all or nothing. If there is secrecy for 99 transactions and then a failure on the […]
Zoom + Keybase
There is an opportunity here to signal that Zoom is not a Chinese asset. Zoom can effectively remove itself from the board by completely mitigating passive surveillance. When no state’s intelligence agency benefits from a home field advantage with Zoom, then its value as a strategic cyber asset is massively reduced. If Zoom eliminates the […]
- 1
- 2
- 3
- 4
- Next Page »