• úvod
  • témata
  • události
  • tržiště
  • diskuze
  • nástěnka
  • přihlásit
    registrace
    ztracené heslo?
    LITTLEBOYAnonymita na internetu :: TOR - FREENET - FREEPROXY - ...



    Temata


  • novinky ze sveta #security #privacy obecne, nejen #tor #pgp ale taky app pro telefony, sifrovani disku [#truecrypt, #luks/#dm], bezpecne #backupy
  • ocenovany jsou navody a howto pro ruzne novacky, pokud mate, dejte vedet, dame i na home
  • aktualni admin: Overdrive, takze pokud neco, klidne piste do posty
  • PROSBA: pokud linkujete, vzdy napiste co to vlastne linkujete, ne, ze by jeden neveril neznamemu linku, ale je to tak prehlednejsi

  • Spratelene kluby: [ PGP, SSL & Co. ] -- [ Technoparanoia (Facebook, Google latitude a další) + NSA + účinné postupy při obraně soukromí ] -- [ Cyber.Punk: cyberpunk is not dead! cyberpunk is NOW! : SubHuman, PostHuman, TransHuman, InHuman ]
    Know & Howto: [ Pretty Good Privacy - Wikipedia ]
    rozbalit záhlaví
    ALMAD
    ALMAD --- ---
    OVERDRIVE: Je nějaký porovnání s ghostery?

    OVERDRIVE: Telegram používám řek bych aspoň půlrok a prodával bych ho ostatním ne jako bezpečný IM, ale jako použitelný IM.

    IMHO nejlepší, co je k dispozici.
    OVERDRIVE
    OVERDRIVE --- ---
    Privacy Badger blocks spying ads and invisible trackers.

    Privacy Badger | Electronic Frontier Foundation
    https://www.eff.org/privacybadger

    [jeste jsem necet ani nezkousel, sam pouzivam aktualne

    uBlock - Home
    https://www.ublock.org/

    ]

    Tak uvidime...
    OVERDRIVE
    OVERDRIVE --- ---
    ISATAG: neznam, ale da se to udelat tak, ze napises text a pak jej screenshotnes a pastnes.... ale takovahle vec asi ne-uplne zajisti nejakou bezpecnost... proc nechces pouzivat PGP? Co je cilem, pred kym ty emaily chranis?
    ISATAG
    ISATAG --- ---
    Mam dotaz. Existuje nejaky emailovy klient (idealne addon do thunderbirdu), ktery by mi cely napsany text jednoduchym kliknutim prevedl do jpeg nebo neceho podobneho v tele emailu?
    Tj. aby se emaily ode me nedaly dale zpracovavat copy-pastem, menit a updavovat v odpovedi apod. Porebuju neco, kde cilovy clovek nepouziva PGP nebo neco podobneho.
    OVERDRIVE
    OVERDRIVE --- ---
    Takovej pop clanek ... ale patri k tematu

    Armouring up online: Duncan Campbell's chief techie talks crypto with El Reg • The Register
    http://www.theregister.co.uk/2014/12/19/crypto_toolkit_1/
    OVERDRIVE
    OVERDRIVE --- ---
    OVERDRIVE
    OVERDRIVE --- ---
    KRISHNA
    KRISHNA --- ---
    OVERDRIVE: Snort, já používal distribuci snorby

    A byl jsem na přednášce od Invea-tech a jejich flow-mon, zajímavý, ale ne free pochopitelně.
    OVERDRIVE
    OVERDRIVE --- ---
    QWWERTY: Muzes mit vic verzi, zkusil bych dogooglit jak je prepinat na zaklade appky, pripadne bysem asi virtualizoval a hodne ladil firewall
    OVERDRIVE
    OVERDRIVE --- ---
    A new freeware version of Netwitness' core product, NetWitness Investigator, was made available today. I was able to get access to it several days ago for a test run. It looks and feels much like Wireshark, but with a lot more capability. The only two issues I found with the tool is that the registration process (required) is a bit quirky but eventually works, and you'll see a noticible drop in computer performance while its running. But considering that this is a sniffer on steroids I suspect that a performance drop is to be expected.

    Here are notes from the NetWitness web site:

    Product Features:

    Captures raw packets live from most wired or wireless interfaces
    Imports packets from any open-source, home-grown and commercial packet capture system (e.g. .pcap file import)
    License supports 25 simultaneous 1GB captures - far exceeding data manipulation capabilities of packet tools like Wireshark
    Real-time, patented layer 7 analytics
    – Effectively analyze data starting from application layer entities like users, email, address, files , and actions.
    – Infinite, free-form analysis paths
    – Content starting points
    – Patented port agnostic service identification
    Extensive network and application layer filtering (e.g. MAC, IP, User, Keywords, Etc.)
    IPv6 support
    Full content search, with Regex support
    Exports data in .pcap format
    Bookmarking & history tracking
    Integrated GeoIP for resolving IP addresses to city/county, supporting Google® Earth visualization
    NEW! SSL Decryption (with server certificate)
    NEW! Interactive time charts, and summary view
    NEW! Interactive packet view and decode
    NEW! Hash PCAP on Export
    NEW! Enhanced content views

    Minimum system requirements:
    NetWitness recommends the following minimum hardware requirements for NetWitness Investigator:

    Windows® XP, 2003 Server, or Vista 32-bit
    Single 2Ghz Intel-based processor(Dual-core recommended)
    1GB RAM(2GB Recommended)
    1 Ethernet Port
    Internet Explorer v7+ (IE v6.x may limit some functionality)
    Ample data storage for collected data
    Note: Linux infrastructure available in commercial versions

    The fully functional and licensed free version of NetWitness Investigator is at: http://download.netwitness.com. We are interested in your comments if you've downloaded and tried this software. Please let us know via our contact form.

    Marcus H. Sachs
    Director, SANS Internet Storm Center

    New Tool: NetWitness Investigator - SANS Internet Storm Center
    https://isc.sans.edu/forums/diary/New+Tool+NetWitness+Investigator/5351/
    OVERDRIVE
    OVERDRIVE --- ---
    heleho, google ma novy pop-up window:

    A privacy reminder from Google

    To be consistent with data protection laws, we're asking you to take a moment to review key points of Google's Privacy Policy. This isn't about a change we've made – it's just a chance to review the key points below. Click "I agree" to agree to the terms set out below and you will continue to Search; you can also explore other options on this page.
    Data we process when you use Google

    When you search for a restaurant on Google Maps or watch a video on YouTube, for example, we process information about that activity – including information like the video you watched, device IDs, IP addresses, cookie data and location.
    We also process the kind of information described above when you use apps or sites that use Google services like ads, Analytics and the YouTube video player.

    Why we process it

    We process this data for the purposes described in our policy, including to:

    Help our services deliver more useful, customised content such as more relevant search results;
    Improve the quality of our services and develop new ones;
    Deliver ads based on your interests, including things like searches you've done or videos you've watched on YouTube;
    Improve security by protecting against fraud and abuse; and
    Conduct analytics and measurement to understand how our services are used.

    Combining data

    We also combine data among our services and across your devices for these purposes. For example, we use data from trillions of search queries to build spell-correction models that we use across all of our services, and we combine data to alert you and other users to potential security risks.

    Tip: If you sign in to your Google Account before agreeing, we'll remember your choice across all of your signed-in devices and browsers.
    OVERDRIVE
    OVERDRIVE --- ---
    Mam prosbu, pozivate nejake intrusion detection systemy, scripty, binarky?
    Pokud, tak jaky. Docela by me zajimalo, po cem koukat, nemam s tim skoro zadne zkousenosti. Nasel jsem zajimavou vec [firmu]: https://en.wikipedia.org/wiki/Netwitness coz jsou spis forenzi toolly, ale obecne me zajima ruzna forma IDS a forenze... Linky ocenim zvednutym placem ;]
    MATT
    MATT --- ---
    Researchers mount successful attacks against Tor network—and show how to prevent them
    http://phys.org/news/2015-07-mount-successful-tor-networkand.html
    QWWERTY
    QWWERTY --- ---
    OVERDRIVE: no .. nejlepsi firemni ntb, kdy Java je nejvetsi bezpecnostni zlo a nemuzu ji updatovat, protoze pod tou novou nechodi firemni tooly :D
    OVERDRIVE
    OVERDRIVE --- ---
    btw, doporucuju, kdyz uz mame hromadu 0day-u zejo:

    Keep your Firefox healthy with a quick checkup — Mozilla
    https://www.mozilla.org/en-US/plugincheck/
    OVERDRIVE
    OVERDRIVE --- ---
    Tak jo, zeptej se na specifikaci, a pak si ji gogoogli, zejo.... [sorry, proste jsem se nechtene zeptal driv, nez jsem si nasel primarni zdroj] : http://arxiv.org/pdf/1507.05724v1.pdf
    OVERDRIVE
    OVERDRIVE --- ---
    Predpokladam, ze lokalni osazenstvo zaznamenalo TOR v podani HORNET zejo?
    Uz to je nekde nejak popsane podrobne [specifikace], pripadne existuje uz nejaka aplikace?

    Researchers claim they’ve developed a better, faster #Tor

    http://t.co/5uDpSzdj55

    #hornet #security #privacy #toReadMore
    OVERDRIVE
    OVERDRIVE --- ---
    Jeste jednou Hacking Team, tentokrat hack, aby to behalo ve vmWare, a co to vlastne dela:

    Galileo RCS - Running an espionage operation - 4ARMED
    https://www.4armed.com/blog/galileo-rcs-running-espionage-operation/

    Na rootu napsal Jenda Hrach hezky clanek:

    Rozbor malware od Hacking Teamu: jak se používá? - Root.cz
    http://www.root.cz/clanky/rozbor-malware-od-hacking-teamu-jak-se-pouziva/
    OVERDRIVE
    OVERDRIVE --- ---
    msm1267 writes: Two Belgian security researchers from the University of Leuven have driven new nails into the coffin of the RC4 encryption algorithm. A published paper, expected to be delivered at the upcoming USENIX Security Symposium next month in Washington, D.C., describes new attacks against RC4 that allow an attacker to capture a victim's cookie and decrypt it in a much shorter amount of time than was previously possible. The paper "All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS," written by Mathy Vanhoef and Frank Piessens, explains the discovery of new biases in the algorithm that led to attacks breaking encryption on websites running TLS with RC4, as well as the WPA-TKIP, the Wi-Fi Protected Access Temporal Key Integrity Protocol.

    links @ http://it.slashdot.org/...15/07/17/019235/new-rc4-encryption-attacks-reduces-plaintext-recovery-time
    OVERDRIVE
    OVERDRIVE --- ---
    NSA releases Linux-based open source infosec tool - Security - News - iTnews.com.au
    http://www.itnews.com.au/News/406509,nsa-releases-linux-based-open-source-infosec-tool.aspx

    Earthquake Retrofit writes: The NSA's systems integrity management platform — SIMP — was released to the code repository GitHub over the weekend. NSA said it released the tool to avoid duplication after US government departments and other groups tried to replicate the product in order to meet compliance requirements set by US Defence and intelligence bodies. "By releasing SIMP, the agency seeks to reduce duplication of effort and promote greater collaboration within the community: the wheel would not have to be reinvented for every organisation," the NSA said in a release.
    OVERDRIVE
    OVERDRIVE --- ---
    Tady je chyba "alternative chains" rozebrana vcelku polopaticky

    OpenSSL CVE-2015-1793: Separating Fact from Hype
    http://blog.trendmicro.com/...security-intelligence/openssl-cve-2015-1793-separating-fact-from-hype/
    Kliknutím sem můžete změnit nastavení reklam