ggerganov/kbd-audio: Tools for capturing and analysing keyboard input paired with microphone capturegithub.com/ggerganov/kbd-audio
Tools for capturing and analysing keyboard input paired with microphone capture - ggerganov/kbd-audio
Inside the Crypto World's Biggest Scandal | WIREDwired.com/story/tezos-blockchain-love-story-horror-story/
One couple thought they held the secret to building a new decentralized utopia. On the way, they plunged into a new kind of hell. A crypto-tragedy in three acts.
Audio Adversarial Examplesnicholas.carlini.com/code/audio_adversarial_examples/
We have constructed targeted audio adversarial examples on speech-to-text transcription neural networks: given an arbitrary waveform, we can make a small perturbation that when added to the original waveform causes it to transcribe as any phrase we choose.
The law isn’t ready for the internet of sexual assaultengadget.com/2017/05/24/sextech-hacking-laws/
If the Mirai botnet taught us anything, it's that no device connected to the internet is safe from hacking. In that incident, malware hijacked thousands of dev...
ascott1/ethical-web-dev: A series of short books on ethical web developmentgithub.com/ascott1/ethical-web-dev
ethical-web-dev - A series of short books on ethical web development
Stateless password manager
How To Safely Store A Password | codahale.comcodahale.com/how-to-safely-store-a-password/
CUDA/OpenCL implementations of password crackers can leverage the massive amount of parallelism available in GPUs, peaking at billions of candidate passwords a second. You can literally test all lowercase, alphabetic passwords which are ≤7 characters in less than 2 seconds. And you can now rent the hardware which makes this possible to the tune of less than $3/hour.
AutomatingOSINT.com - Learn How to Automate OSINT Collectionregister.automatingosint.com/
This is the only course, literally - you can’t get it anywhere else, that teaches you how to write code to automatically extract and analyze data from the web and social media. Join students from around the world from law enforcement, journalism, information security and more.
How many secrets do you have?github.com/frankmcsherry/blog/blob/master/posts/2017-02-08.md
This is a quick post, ruminating on the difference between two flavors of differential privacy in common use. I'm a fan of one, and the other weirds me out a bit. I think I have started to get a handle on why that is.