#filtración vs #difamación by Hacksperger


Vosotros seguir #difamando que yo seguiré #filtrando.

#filtraciones http://eskup.elpais.com/misterwinston

y + = #ResetThePlanet 

Data, data, data. Hack the universal code. #HackUniversalCode #HelloDave #werther-bureau #TheGarage #ZombieFarm

The active and Ethical Hacker.

5_cirkloj_en_60_60_60_triangulo_v2 (2)

 

 

 

 

 

 

#HackUniversalCode

 

Ethical Hacker
Ethical Hacker

WELCOME TO #werther-bureau

 

 

Anonymous VS FBI: Retaliation, leaks data from FBI network, hacks Spanish government over corruption


34636
34636

FBI claims victory over the Anonymous group, this statement has come after a series of arrests from the anonymous group. According to FBI, the last year arrest of 5 members from Lulz security was vital for their command over the anonymous. All the 5 members were key parts of anonymous group and were a threat in the world of internet.

LulzSec at the time of arrests had accepted the attacks on Sony pictures and Fox’s reality show ‘X-factor’. But, since the arrests there have been no big attacks or breaches taken place from the group. FBI believes this has made them identify the downfall of the anonymous groups. One of the FBI officials says:

  • “All of these guys were major players in the Anonymous movement, and a lot of people looked to them just because of what they did,”

  • “The movement is still there, and they’re still yacking on Twitter and posting things, but you don’t hear about these guys coming forward with those large breaches,” he said. “It’s just not happening, and that’s because of the dismantlement of the largest players.”

But, there weren’t 5 arrests there was another individual who was working for another group by the name ofAntiSec. All these arrests took place by FBI’s officials. In 2012, this sixth individual who was nicknamed as “SABU” gave all the required information regarding the group to FBI and this eventually led to arrest of 5 members of LulzSec. This, however, also created a layer of distrust within the group which has stopped them from working as a single unit these days.

FBI team has become really active these days and is keeping an eye on every single activity of the group. The arrest of “SABU” is of the examples of this. Sabu once by mistake exposed his IP to this FBI quickly traced his location in Manhattan which lead to his arrest.

MORE: http://hackread.com/anonymous-vc-fbi-retaliation-analysis/

VIA: http://hackread.com/

 

Quantum Encryption Loopholes


Quantum cryptography
Quantum cryptography

Quantum Cryptography: Perfect Eavesdropper Illustrates Overlooked Loophole in Secure Communications Technology

Loopholes in implementations of quantum cryptography

Makarov, Vadim
QCRYPT 2011: First Annual Conference on Quantum Cryptography
ETH Zurich, Switzerland

Loopholes in implementations of quantum cryptography from Dmitriy Safin on Vimeo.

 

DEF CON: The Documentary


DefCon_21_
DefCon_21_

 

DEF CON is the world’s largest hacking conference, held in Las Vegas, Nevada. In 2012 it was held for the 20th time. The conference has strict no-filming policies, but for DEF CON 20, a documentary crew was allowed full access to the event. The film follows the four days of the conference, the events and people (attendees and staff), and covers history and philosophy behind DEF CON’s success and unique experience. Written by Jason Scott

Like this? Leave feedback on IMDB:
http://www.imdb.com/title/tt3010462/

Get involved with DEF CON:
https://forum.defcon.org/
https://www.defcon.org/

POSTER: https://www.defcon.org/images/defcon-21/defcon-21-receipt.pdf

https://defcon.org/html/defcon-21/dc-21-index.html

defcon_21
defcon_21

Car immobilizer hacking [SIGINT13] Speaker: Karsten Nohl


lecture: Car immobilizer hacking

Car manufacturers nicely illustrate what _not_ to do in cryptography.

Immobilizers have for a long time increased the difficulty of stealing cars. Older immobilizer transponders defeated thieves by requiring non-trivial RF skills for copying keys. Current transponders go one step further by employing cryptographic functions with the potential of making car cloning as difficult as breaking long-standing mathematical problems. Cryptography, however, is only as strong as the weakest link of key management, cipher strength, and protocol security. This talk discusses weak links of the main immobilizer technologies and their evolution over time.

Speaker: Karsten Nohl
EventID: 5034
Event: SIGINT 2013 by the Chaos Computer Club [CCC] Cologne
Location: KOMED; Im Mediapark 7; 50670 Cologne; Germany
Language: english
Begin: 05.07.2013 17:00:00 +02:00
Lizenz: CC-by-nc-sa