|
WAR DOGS OF SOCHI posted:uh...i've been to many a library conference and depending on the crowd, they tend to be a bunch of librarians pissing and moaning about how to get the respect they deserve and to prove their worth to the world. ala is better than most but still ain't nobody talkin' about archiving at these things and internet privacy to a librarian means putting a polarized screen on the desktops so that their patrons can continue to watch rape porn in the childrens room I don't think this was ever a problem the other way around for libraries because what a library is, and how you organise it, is really kind of intuitive - but it doesn't work at all for archives. Anyway it's interesting to hear the two disciplines still being lumped together by old people who dunno wtf they're doing. *something about internet security here*
|
# ¿ Jun 28, 2017 14:57 |
|
|
# ¿ May 6, 2024 17:58 |
|
ratbert90 posted:Taking a shower at the gym I realized that anybody flushing the toilets makes the water temp go up by 10F. can you flush enough toillets to effectively ddos the showers into pumping out boiling water
|
# ¿ Jun 28, 2017 20:16 |
|
ratbert90 posted:I would think that's a buffer overflow. so ddosing a toilet would be like cramming 50 dudes in there all trying to take a poo poo at the same time?
|
# ¿ Jun 28, 2017 20:23 |
|
this is much more on my intellectual level than cybrary
|
# ¿ Jun 28, 2017 20:32 |
|
some people upthread were saying that Ukraine has been an "live fire range" for Russian malware for a while now. Is there any good in depth journalism on this? I'd love to read a potted history of what's happened.
|
# ¿ Jun 29, 2017 21:51 |
|
Shifty Pony posted:wired has a story on it which isn't entirely awful. it goes over the pattern of the attacks starting out as largely manually executed against a particular system and then iterating until they are automated attacks based on modular tools which could be more easily adapted for use against other targets. if you dig a bit online about each of the incidents in the article there are usually a few blog posts by researchers. Wicked, thanks.
|
# ¿ Jun 30, 2017 06:06 |
|
spankmeister posted:here's a video of the police raid on MEDoc, the company that (likely unwittingly) spread the NotPetya malware im the assault rifle and 35lbs of tacticlol garbage necessary for raiding an office full of computer touchers
|
# ¿ Jul 5, 2017 16:10 |
|
Just keep all your passwords in a word file on your desktop titled "passwords" like my dad.
|
# ¿ Jul 6, 2017 08:50 |
|
cinci zoo sniper posted:an app idea - 0dayr, crashes your phone on activation You could probably find a venture capitalist ready to invest 10 mil into this. Just change "crashes" to "disrupts", make some vague noises about monetisation strategy, and you're golden.
|
# ¿ Jul 7, 2017 08:19 |
|
Y'all sound so depressed and cynical about every method of protecting user data like login credentials. If 2fa using my phone isn't going to keep my neopets account safe what is?
|
# ¿ Jul 9, 2017 09:53 |
|
Maximum Leader posted:using a 2fa code tattooed to your dick Well that would guarantee security via obscurity, but I don't know if three characters would be secure enough....
|
# ¿ Jul 9, 2017 10:41 |
|
lol
|
# ¿ Jul 10, 2017 17:38 |
|
e: nvm
communism bitch fucked around with this message at 19:44 on Jul 10, 2017 |
# ¿ Jul 10, 2017 19:42 |
|
spankmeister posted:I went to this crypto museum last year and they had a large collection of enigmas and we weren't tuoposed to touch it but I couldn't help myself. It's a very satisfying machine. I dunno if it's still a thing but a few years ago the Bletchley Park crypto myuseum was selling fully functional Enigma replicas in kit form that you built yourself. If you google around maybe they're still doing it.
|
# ¿ Jul 13, 2017 17:31 |
|
Ah that's a pity. I bet some insane person makes functional mechanical replicas for people with a few grand to spare.
|
# ¿ Jul 13, 2017 17:44 |
|
I think it'd be safer and maximum opsec for all concerned if we put all the 5 eyes spooks in a single gigantic airtight off-the-grid facility 5 miles underground and permanently sealed up the entraces and exits.
|
# ¿ Jul 14, 2017 07:22 |
|
That would raise some questions as to who or what is currently occupying all the infrastructure above ground while masquerading as government spies.
|
# ¿ Jul 14, 2017 08:13 |
|
jammyozzy posted:(which was a glass-walled meeting room with paper taped over the windows).
|
# ¿ Jul 14, 2017 13:23 |
|
Just send a target fb friend requests from a few dummy accounts over a few weeks/months, then request a pw reset and nominate your own dummies for verification. My sister has over a thousand friends on FB. I don't think there's much discrimination there, she probably just adds everybody. Now my sis is for sure a confirmed moron, but i don't think she's much worse than average.
|
# ¿ Jul 31, 2017 17:36 |
|
LP0 ON FIRE posted:what does that do? you're reactivating your dummy account with other dummy accounts? No, you make a bunch of dummy accts, friend them to the account you want to compromise, then (if that works) try to password reset the target account, which requires you to name some trusted fb friends for id verification. If you nominate the dummies that you control you can get the codes needed to reset the target account pw. But if the trusted friends need to be specifically selected in advance by the legit account holder it'd be super convoluted and probably not possible anyway.
|
# ¿ Jul 31, 2017 17:50 |
|
quote:China has successfully sent "hack-proof" messages from a satellite to Earth for the first time. Is this "hack-proof" or """""""""hack-proof"""""""""? Presumably at some point in the process (once the data reaches its destination?) your secret quantum data needs to be turned back into its original best_simpsons_quotes.txt format to be usable, at which point it's as vulnerable as anything else? Is the data actually less vulnerable during transmission, or is it just easier to figure out its been compromised once it reaches its destination? gently caress copmuters
|
# ¿ Aug 10, 2017 14:42 |
|
ate all the Oreos posted:if it's actual quantum encryption then the idea is it's basically a very secure way to send key data, after that it's just a boring normal OTP (or a stream cipher or whatever). so basically if anyone intercepts the key data or looks at it or anything you gently caress with the quantum-y bits of the system and it's immediately detectable (in fact it completely prevents you from continuing the connection), so you cancel the transmission before any of the ciphertext is even encoded. quote:e: also I swear someone already did it from a satellite to a ground station years ago so idk if this is anything new or just China trying to look cool
|
# ¿ Aug 10, 2017 14:57 |
|
Yes hello, please preserve for one thpusand years this 1tb hdd with millions of copies of hello.jpg
|
# ¿ Aug 15, 2017 17:09 |
|
Migishu posted:I'm going to make a legacy for myself where the FBI and all them will want to get access to all my private files, only to see nothing but hello.jpg as every file on the disk steganographically encode blue waffle into one of them.
|
# ¿ Aug 15, 2017 19:07 |
|
Apparently they threw it in a rock smasher after the steamroller didn't destroy it as comprehensively as they hoped.
|
# ¿ Aug 30, 2017 22:00 |
|
Is it dumb for a big-ish company handling sensitive information to have company wifi secured with WEP in tyool 2017? I'm not acomputer toucher at all, but I heard that WEP is basically a joke, in security terms.
|
# ¿ Sep 22, 2017 08:46 |
|
I know this is a vague follow-up but if somebody hreaks into the wifi what's the reasonable worst they could do? Cause if it's just boosting free wifi i don't think anybody would care.
|
# ¿ Sep 22, 2017 08:55 |
|
|
# ¿ May 6, 2024 17:58 |
|
It's "ground control" not "command and control" you gosh drat plebs.
|
# ¿ Sep 26, 2017 18:27 |