The law isn’t ready for the internet of sexual assault
engadget.com/2017/05/24/sextech-hacking-laws/If the Mirai botnet taught us anything, it's that no device connected to the internet is safe from hacking. In that incident, malware hijacked thousands of dev...
ascott1/ethical-web-dev: A series of short books on ethical web development
github.com/ascott1/ethical-web-devethical-web-dev - A series of short books on ethical web development
LessPass
lesspass.com/Stateless password manager
How To Safely Store A Password | codahale.com
codahale.com/how-to-safely-store-a-password/CUDA/OpenCL implementations of password crackers can leverage the massive amount of parallelism available in GPUs, peaking at billions of candidate passwords a second. You can literally test all lowercase, alphabetic passwords which are ≤7 characters in less than 2 seconds. And you can now rent the hardware which makes this possible to the tune of less than $3/hour.
AutomatingOSINT.com - Learn How to Automate OSINT Collection
register.automatingosint.com/This is the only course, literally - you can’t get it anywhere else, that teaches you how to write code to automatically extract and analyze data from the web and social media. Join students from around the world from law enforcement, journalism, information security and more.
How many secrets do you have?
github.com/frankmcsherry/blog/blob/master/posts/2017-02-08.mdThis is a quick post, ruminating on the difference between two flavors of differential privacy in common use. I'm a fan of one, and the other weirds me out a bit. I think I have started to get a handle on why that is.
TOR Node List
dan.me.uk/tornodesDisplays a full TOR node list no more than one hour old. Includes detailed information in script-readable format
gchq/BoilingFrogs: GCHQ's internal Boiling Frogs research paper on software development and organisational change in the face of disruption #boilingfrogs
github.com/gchq/BoilingFrogsThe pace of disruptive change is increasing, from the rise of cloud technology, social business, the Internet of Things and others. We feel it as much as other government departments and so we offer this internal research paper publicly, not to present policy or guidelines, but to stimulate debate.
CyberChef
gchq.github.io/CyberChef/The Cyber Swiss Army Knife