Tags (Rótulos): hacking*

53 bookmark(s) - Ordenar por: Data ↓ / Título / Voting /

  1. -
    https://www.latelierpaysan.org
    Voting 0
  2. -
    http://farmhack.org/tools
    Voting 0
  3. -
    http://theinstitute.ieee.org/technolo...cs/cybersecurity/a-history-of-hacking
    Voting 0
  4. -
    https://motherboard.vice.com/en_us/topic/right-to-repair
    Voting 0
  5. -
    https://ifixit.org/right
    Voting 0
  6. -
    https://repair.org
    Voting 0
  7. -
    https://steveblank.com/2009/04/27/the...cret-life-of-fred-terman-and-stanford
    Tags: , , , , by polart (2018-02-22) | Cache | PDF | PNG | Permalink
    Voting 0
  8. -
    http://we-make-money-not-art.com/obfu...a-users-guide-for-privacy-and-protest
    Tags: , , , by polart (2018-02-22) | Cache | PDF | PNG | Permalink
    Voting 0
  9. In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" — the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

    The CIA made these systems unclassified.

    Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.

    To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.
    https://wikileaks.org/ciav7p1
    Voting 0
  10. -
    http://hacking-printers.net
    Voting 0

Top of the page

First / Anterior / Próximo / Last / Página 1 de 6 fluxo de links: tagged with "hacking"

Sobre - Propulsed by SemanticScuttle