Contents Pages by Subject

Hacking, Cyber Security

Subject Photo
Article Image

Schneier on Security

Researchers discovered this vulnerability and submitted it to CERT. Neither the researchers nor CERT disclosed it to the Tor Project. Instead, they used it to deanonymize hidden service visitors and provide the information to the FBI.

Article Image

Washington Post

Fast, flexible and free, Linux is taking over the online world. But there is growing unease about security weaknesses. [We only want to help.]

Article Image

The Economist

Bitcoin's shady image causes people to overlook the extraordinary potential of the "blockchain", the technology that underpins it. This innovation carries a significance stretching far beyond cryptocurrency. Simply, it is a machine for creating

Article Image

http://thehill.com, By Katie Bo Williams

The teenaged hackers who exposed the personal email account of CIA head John Brennan are hacking into more government officials' accounts in retaliation for the FBI investigation into their actions.

Article Image

Schneier on Security

.... This is the first practical break of the full SHA-1, reaching all 80 out of 80 steps, while only 10 days of computation on a 64 GPU cluster were necessary to perform the attack. ....

thelibertyadvisor.com/declare