NSA Over-surveillance
November 11 2022Here in 2022, we have a newly declassified 2016 Inspector General report—”Misuse of Sigint Systems”—about a 2013 NSA program that resulted in the unauthorized (that is, illegal) targeting of...
Read moreHere in 2022, we have a newly declassified 2016 Inspector General report—”Misuse of Sigint Systems”—about a 2013 NSA program that resulted in the unauthorized (that is, illegal) targeting of...
Read morePatches, busts, leaks and why even low-likelihood exploits can be high-severity risks - listen now!
Read moreIn all the excitement, we kind of lost track ourselves. Were there six 0-days, or only four?
Read moreThis technique measures device response time to determine distance:
The scientists tested the exploit by modifying an off-the-shelf drone to create a flying scanning device, the Wi-Peep. The robotic...
Read more
Never make your users cry/By how you use an API
Read moreThat was the week that was...
Read moreListen now - latest episode - audio plus full transcript
Read moreIt’s Iran’s turn to have its digital surveillance tools leaked:
According to these internal documents, SIAM is a computer system that works behind the scenes of Iranian cellular networks,...
Read more
Latest episode - listen (or read) now. Teachable moments for X-Ops professionals!
Read more"We told you to stop but you ignored us," said the French regulator, "so now we're coming after you again."
Read more
Recent Comments