The FBI not being able to snoop on Tor users isn't that much of a surprise considering they are not a real intelligence agency, so their technical resources are rather limited. Tor would be more than...
Type: Posts; User: KaosuX; Keyword(s):
The FBI not being able to snoop on Tor users isn't that much of a surprise considering they are not a real intelligence agency, so their technical resources are rather limited. Tor would be more than...
I disagree completely and here is why:
1. Timing attacks have become much easier to perform. Before hand you would need a lot of resources (think state sponsored) which most attackers couldn't get...
I somewhat agree with most of your statement, but I would like to point out that the NSA has made an unknown breakthrough in cryptanalysis. I have no idea what this vague reference means and I am...
TOR will reduce your overall security by a large margin. Why? Well, because it is very easy to set yourself up as an exit node and sniff the traffic. Since SSLStrip is also pretty easy to use, you're...
That article is semi-correct. It has some facts wrong. The article makes it look like this is a new discovery within a few years time, but this is something people have been researching since 1999....
I have recently started this project from scratch because I was unhappy with several aspects of the script and felt it was lacking. The newest version I am working on uses udev, which provides me...
Introduction
Guardian is a simple script that will contionuously run in the background and notify you of any USB device that is inserted into the machine that is not specified in a whitelist. I...
Please review the advice I gave in the following thread: http://ubuntuforums.org/showthread.php?t=2132516. Once you have mounted the encrypted device, it would be easy to create an image of the...
I was once a fan of WiTopia's OpenVPN service because it was stable, the company seemed to live by their claims in regards to end-user privacy, and seemed to take the security of their service...
I don't know if you're still monitoring this thread, but here are some helpful suggestions to help you get this project going.....
1) Create a LiveCD using an installation image from the official...
You don't give enough information that allows anyone to actually assist you and there are too many variables which seem to be assumed by the posters involved in this topic. While it is possible that...
XTS-PLAIN is perfectly fine when encrypting hard drives that are smaller than 2TB's. However, using XTS-PLAIN on hard drives larger than 2TB's will dramatically reduce your security because of...
I agree that this thread has been hijacked. I will leave this conversation with just a few key points made:
A) Please note the following bolded text below;
B) The situations you described...
We're not talking about a default installation, though. I was talking about ways people can fortify themselves against physical attacks. That would be like me making recommendations for securing a...
That is not really the point, though. The point is simply having physical access to the machine does not guarantee you will have full access to it, at least not trivially like you suggested in the...
1) A lot of newer consumer-level motherboards are actually made using the same materials and in the same factory as server/enterprise-level hardware. While they will differ in obvious areas, a lot of...
This is true for older hardware. However, dual-BIOS chips are common when using modern hardware. One is suppose to remain "stock" so if something goes wrong with the primary chip (or settings) then...
Your comment is not entirely true. While physical attacks are difficult to combat, it is not an impossible feat. I believe most people still repeat "physical = root" because it was a very popular...
New code has been released in the original post. Let me know what you guys think of the newest version.
This is still in very early development so the code-base is subject to change dramatically...
The simple design is a choice, not a mistake. I wanted to keep the implementation simple to prevent possible unwanted functionality and security vulnerabilities. I do understand the concept quite...
UPDATE: New code has been released. These forums hate my comment formatting so just ignore the obvious odd formatting of my comments, haha.
Fort Knocks is one of a kind hybrid implementation of a...
Running anti-virus software on a GNU/Linux desktop is rather pointless. I mean, it can be useful if you're dual-booting and you would like to scan your Windows partition for malware. However,...
I won't dispute your first point. I was not linking to those bulletins as active security issues, because I was afraid that might go against the forum guidelines. It was just the first hit on Google...
I have not reviewed this profile. I have actually taken the time to carefully create my own profiles for all of the software that I use. However, I will do a quick Google search and take a look at...
I have run into this problem before. While it might seem like an impossible task, it is quite simple to deter for the most part. Follow these basic guidelines and you can begin the process of...