joelanders | 10 years ago | on: Shelling Out Sucks (2012)
joelanders's comments
joelanders | 11 years ago | on: What are your favourite sci-fi books?
Super trippy.
joelanders | 11 years ago | on: Evil 32: Check Your GPG Fingerprints
joelanders | 11 years ago | on: Running a South Pole data center
joelanders | 11 years ago | on: Show HN: Snapception – Intercept all snapchats received over the network
joelanders | 11 years ago | on: Show HN: Snapception – Intercept all snapchats received over the network
[1] http://moyix.blogspot.de/2014/07/breaking-spotify-drm-with-p...
joelanders | 11 years ago | on: Show HN: Snapception – Intercept all snapchats received over the network
joelanders | 11 years ago | on: The Emails Snowden Sent to First Introduce His NSA Leaks
joelanders | 11 years ago | on: Adobe Spyware Reveals Again the Price of DRM: Your Privacy and Security
[1] http://moyix.blogspot.de/2014/07/breaking-spotify-drm-with-p...
joelanders | 11 years ago | on: How Two Men Unlocked Modern Encryption
joelanders | 11 years ago | on: Write every day
joelanders | 11 years ago | on: MTA Responds Citing Lack of “Infinite Change” for MetroCards
joelanders | 11 years ago | on: Lost Lessons from 8-Bit BASIC
joelanders | 11 years ago | on: Tehran tracked, captured, studied, copied RQ-170
joelanders | 12 years ago | on: Replacing a Thinkpad X60 Bootflash Chip
joelanders | 12 years ago | on: Replacing a Thinkpad X60 Bootflash Chip
It's difficult to weigh the cost/benefit, and nobody is denying that PKI can be awkward.
/thread?
ed: ok, i guess we might still debate the cost/benefit of getting a free cert--i don't really know.
joelanders | 12 years ago | on: Replacing a Thinkpad X60 Bootflash Chip
She explains how to check the SSL certificate fingerprint here:
https://blog.patternsinthevoid.net/isis.txt
Once you've whitelisted her self-signed cert, you know from then on that you're not being MITMed (for what that's worth in a blog).
joelanders | 12 years ago | on: Replacing a Thinkpad X60 Bootflash Chip
joelanders | 12 years ago | on: Mission Impossible: Hardening Android for Security and Privacy
"A commodity laptop is analyzed to identify exposed attack surfaces and is then secured on both the hardware and the firmware level against permanent modifications by malicious software as well as quick drive-by hardware attacks by evil maids, ensuring that the machine always powers up to a known good state and significantly raising the bar for an attacker who wants to use the machine against its owner."
http://media.ccc.de/browse/congress/2013/30C3_-_5529_-_en_-_...
And this is the best blog post I know of on the above:
https://blog.patternsinthevoid.net/replacing-a-thinkpad-x60-...
joelanders | 12 years ago | on: Free Your Android
On HN: https://news.ycombinator.com/item?id=7715041
Original: https://blog.torproject.org/blog/mission-impossible-hardenin...