Schlagwort-Archive: Video
Take the world from another point of view
Vorsorgeprinzip
(Direktvorsorge, via annalist)
Frühlingsanfang
Gesunde Ansichten
Spam-based economy
(direct spam, via)
Terrorism as a business
Breakdancing Robot
Death Star Threat Modeling
Kevin M. Williams talking on Death Star Threat Modeling at The Last HOPE , 2008 (via No Tricks)
The Evil Jan Attack
Microsoft’s BitLocker is, for all we know, a proper disk encryption software. It encrypts data at rest against attacks originating outside the running system. If you use BitLocker and your computer is stolen while turned off, there is essentially no way of reading data from the disk without having the proper key(s)—your BitLocker PIN, a key file on a USB stick, or both. If an attacker gets access to the machine while it is running, there may be ways of compromising it through Windows or in other ways, but such attacks are clearly outside the scope of disk encryption.
We know, however, another class of attacks against disk encryption: evil maid attacks. This term describes a general strategy rather than a particular implementation. If you leave your computer unattended, let’s say in a hotel room, an attacker, let’s say an evil maid, might manipulate it such that your data will be compromised as soon as you return and provide it with your encryption keys. There are various ways of doing so, for instance installing a hardware keylogger if your keys are based on passwords, or altering the unencrypted boot code to install a Trojan horse that will leak your keys later. The Evil Jan Attack weiterlesen
Gefährliche Rollbretter überleben
In diesem Kontext habe nicht einmal ich etwas gegen eine Helmempfehlung, zumal das gezeigte Material der Namen tatsächlich verdient:
Warum? Weil wir hier ein vernünftiges Gesamtkonzept präsentiert bekommen, von einer Risikoanalyse bis zum Falltraining. Nur eines habe ich zu bemängeln: Der Kopf ist keineswegs der wichtigste Körperteil. Wollte man den Schutzbedarf von Kröperteilen von ihrer Wichtigkeit ableiten — in der IT-Sicherheit übrigens ein beliebter Ersatz für Risikoschätzungen –, so müsste man zweifellos zum Beispiel wesentliche Teile des Blutkreislaufes für gleichermaßen wichtig halten.
Groteskes Bedrohungsmodell
Nerdcore gräbt ja immer wieder großartige Sachen aus. Diesmal: The Horribly Slow Murderer with the Extremely Inefficient Weapon, ein grotesker Kurzfilm basierend auf einem grotesken Bedrohungsmodell.
The Cloud Computing Consultant
White Hat Hacker Man
(video link, lyrics)
In einem Wort
Angstmanipulation
(Direktlink, gefunden bei Mela)
How to Become a Cult Leader
Internet helpdesk
How Effective Are Child Car Seats?
Steven Levitt, after looking at a vast amount of accident data, is convinced that child car seats are pretty useless for children of ages >2. His TED talk teaches important lessons on how we think about safety equipment.
Many thanks to reader Doppelfish for digging this video out.
Don’t worry!
50 Ways to Inject Your SQL
(direct link, found here)
Cryptography for Penetration Testers
The Mathematics of War
According to Sean Gourley this is the formula of war:
P(x)=Cx-α
In this formula, P is the probability of an event, x the number of people killed in the event, and α a value representing the structure of the conflict. Here is his talk of only seven minutes: