[docstoc docId="128360067" mId="-10" width="630" height="550" slideMode="false" showRelatedDocs="true" showOtherDocs="true" allowdownload="true" url="http://www.docstoc.com/docs/128360067/AISEC-TR-2012-001-Android-OS-Security"]AISEC-TR-2012-001-Android-OS-Security[/docstoc]
Karsten Nohl, email@example.com
Luca Melette, firstname.lastname@example.org
Publicado el 11/09/2012 por WhitneyFocus
In this Surveillance Teach-In, award-winning filmmaker Laura Poitras is joined by computer security expert and privacy advocate Jacob Appelbaum and National Security Agency whistle-blower Bill Binney to present an artistic and practical commentary on living in the contemporary Panopticon.
Publicado el 04/06/2012 por yasssunews
Jacob Appelbaum shares his views on privacy, government surveillance and the current state of democracy with YASSSU at the Re:publica conference 2012 in Berlin
Jacob Appelbaum is an independent computer security researcher and hacker. He is currently employed by the University of Washington, and is a core member of the Tor project. Appelbaum is known for representing Wikileaks at the 2010 Hope conference. He has subsequently been repeatedly targeted by US law enforcement agencies, who obtained a court order for his Twitter account data, detained him 12 times at the US border after trips abroad, and seized a laptop and several mobile phones.
Publicado el 22/05/2012 por republica2010
Re-contextualizing our social interactions in the face of privatisation of data leads us into a space of social responsibility. The impact of our permissive data sharing habits and the economic models that incentivize it is not yet fully understood. How may we ensure that we’re fully informed and consenting to information released or sold about us? How may try we ensure that consent is required? How can we re-contextualize and better come to a shared understanding about transitive risks posed by the surveillance state?
Publicado el 14/08/2012 por SecurityTubeCons
This video is part of the Infosec Video Collection at SecurityTube.net:http://www.securitytube.net
Deepsec – Debugging GSM
Slides : -https://deepsec.net/docs/Slides/DeepSec_2010_Debugging_GSM.pdf Dieter Spaar, Karsten Nohl, Security Research Labs, BerlinThe popular GSM cell phone standard uses outdated security and provides much less protection than its increasing use in security applications suggests. Our research aims to correct the disconnect between technical facts and security perception by creating a GSM tool that allows users to record and analyze GSM data to see what security features were really implemented by their operator. The talk discusses a GSM debugging tool that consists entirely of open source software and open radio hardware. We will demonstrate how to record and decode GSM calls, even encrypted ones.Dieter reverse-engineers systems to an open source equivalents. Currently, his work focus is GSM where he contributed to the OpenBSC, OsmocomBB and Airprobe projects.
Deepsec – The Future of Social Engineering
Orbot: Mobile Anonymity + Circumvention
Gibberbot: Secure Instant Messaging
Orweb: Proxy+Privacy Browser
Allow to send a datagram to a remote location, and optionally receive a datagram as answer. Main use case is to check that a correct NAT/firewall configuration is setup to access a UDP server from a public address, when there is no possible access to a machine that can call from the outside.
Tags: udptester, udp untuk android, udp tester, udp test android, download udp tester android.
A Netcat like applilication.
Connect to host and send anything.
- send data interactively
- send data from the file on the strage
- line separator can be specified
- charactercode can be specified
* You need OI FileManager to send a file.
My twetter: @teru_kusu
The Nessus Android.
The Nessus Android app, from Tenable Network Security Inc., enables you to log into your Nessus scanners and start, stop and pause vulnerability scans as well as analyze the results directly from your Android device.
This mobility helps improving the efficiency of your Incident Response process by letting you quickly log into a Nessus scanner from your phone to search previous scan results or check the status of an on-going scan.
(Requires an access to version 4.2 of the Nessus server, or newer)