Wastholm.com

The tweet.IM service sits between your Jabber or Google@Talk instant messaging account and your Twitter account and passes messages to and from, in both directions. As a result, you can create Twitter messages in your instant messaging application and send them direct to Twitter, without having to enter your Twitter account. You can also elect to receive tweets from users that you follow, directly in your instant messenger.

Without the support of two major browsers and major websites most internet users are missing out on the security benefits of perfect forward secrecy. Without the protection of PFS, if an organisation were ever compelled — legally or otherwise — to turn over RSA private keys, all past communication over SSL is at risk. Perfect forward secrecy is no panacea, however; whilst it makes wholesale decryption of past SSL connections difficult, it does not protect against targeted attack on individual sessions. Whether or not PFS is used, SSL remains an important tool for web sites to use to secure data transmission across the internet to protect against (perhaps all but the most well-equipped) eavesdroppers.

The text below is now part of the official documentation of mitmproxy. It's a detailed description of mitmproxy's interception process, and is more or less the overview document I wish I had when I first started the project. I proceed by example, starting with the simplest unencrypted explicit proxying, and working up to the most complicated interaction - transparent proxying of SSL-protected traffic1 in the presence of SNI.

Sakis3G is a tweaked shell script which is supposed to work out-of-the-box for establishing a 3G connection with any combination of modem or operator. It automagically setups your USB or Bluetooth™ modem, and may even detect operator settings. You should try it when anything else fails!

If you are lucky enough, you may be connected 30 seconds after downloading script.

Serval enables mobile communications no matter what your circumstance: mobile communications in the face of disaster, in the face of poverty, in the face of isolation, in the face of civil unrest, or in the face of network black-spots. In short, Serval provides resilient mobile communications for all people, anywhere in the universe.

Serval technology bridges the digital divide. We have proved that it is possible, using open source technology to create a mobile communications platform that benefits everyone, for all time, and changes the nature of telecommunications forever.

At the moment, BEAST requires about two seconds to decrypt each byte of an encrypted cookie. That means authentication cookies of 1,000 to 2,000 characters long will still take a minimum of a half hour for their PayPal attack to work. Nonetheless, the technique poses a threat to millions of websites that use earlier versions of TLS, particularly in light of Duong and Rizzo's claim that this time can be drastically shortened.

“Child pornography is great,” the man said enthusiastically. “Politicians do not understand file sharing, but they understand child pornography, and they want to filter that to score points with the public. Once we get them to filter child pornography, we can get them to extend the block to file sharing.” The date was May 27, 2007, and the man was Johan Schlüter, head of the Danish Anti-Piracy Group (Antipiratgruppen). He was speaking in front of an audience from which the press had been banned; it was assumed to be copyright industry insiders only. It wasn’t. Christian Engström, who’s now a Member of the European Parliament, Oscar Swartz, and I [Rick Falkvinge] were also there.

iodine lets you tunnel IPv4 data through a DNS server. This can be usable in different situations where internet access is firewalled, but DNS queries are allowed. It runs on Linux, Mac OS X, FreeBSD, NetBSD, OpenBSD and Windows and needs a TUN/TAP device. The bandwidth is asymmetrical with limited upstream and up to 1 Mbit/s downstream.

Zfone™ is a new secure VoIP phone software product which lets you make encrypted phone calls over the Internet. Its principal designer is Phil Zimmermann, the creator of PGP, the most widely used email encryption software in the world. Zfone uses a new protocol called ZRTP, which has a better architecture than the other approaches to secure VoIP.

* Doesn't depend on signaling protocols, PKI, or any servers at all. Key negotiations are purely peer-to-peer through the media stream * Interoperates with any SIP/RTP phone, auto-detects if encryption is supported by other endpoint * Available as a "plugin" for existing soft VoIP clients, effectively converting them into secure phones * Available as an SDK for developers to integrate into their VoIP applications * IETF has published the protocol spec as RFC 6189, and source code is published

“Right now, it's just an illusion of security,” said Moxie Marlinspike, a security researcher who has repeatedly poked holes in the technical underpinnings of SSL. “Depending on what you think your threat is, you can trust it on varying levels, but fundamentally, it has some pretty serious problems.”

|< First   < Previous   31–40 (81)   Next >   Last >|