It won't effectively stop browser fingerprinting. Querying javascript and flash and other plugins and system variables won't be rewritten by...
Moontan, I would very much like to share the PoC code. We "shelfed" it upon the recommendation of a party with whom we were doing responsible...
My apologies, I do not have permission to identify any others involved except myself. Safehouse, a secure virtualized OS and free vpn client,...
Chrono, there's no need to bring money into this, I would be happy to just discuss the facts. (infact we're going to give xb access away for free;...
Requires more investigation. I would like to know what technical aspect disables https access for some user accounts, and not for others. In any...
hpmnick, In this particular case, it doesn't seem likely that the problem can be "fixed" by traditional methods, as the vulnerability exists in...
That only seems to add the UK to the list. Better yet, if it is a bug, why does microsoft have any method that discriminates user accounts between...
Not inaccurate. TOR is actively used for intelligence gathering by hackers, businesses, government, military, and intelligence organizations....
Chinese spying on Skype was confirmed in 2008 by Skype themselves, where subsequently it was admitted their chinese "partner" corporation TOM...
This is one of the many prices of "free" services and trusting the wrong people. It will be a hard stretch for Hotmail to claim they are doing...
Nah, it's so much worse than you imagine. No 0-day needed, it would be classified as a "persistent threat" because it uses signed and certified...
Nix, what is your opinion regarding the "retroactive immunity" granted by the US against telecoms regarding civil and criminal culpability and...
It would be even funnier if it wasn't so accurate, thank you Onion. Sad hilarity here
Second bite at the rotten apple.
The specific method the malware uses is not relevant to the fact that malware can break out of virtualized and sandboxed environments. But if you...
Sounds great, but just like RedPhone, I need to see the source code for it to be trustworthy to run on my device. I asked Moxie about this when we...
There haven't been any unanswered support issues for some months now, but thank you for your undying concern. If you someday decide to become a...
specialized proof of concept malware designed to break out of virtualized and sandbox environments. 32/64 makes no difference, hardened or...
Most malware is not virtualization-aware or sandbox-aware. However, I have personally seen malware that breaks out of Sandboxie and VMware, and...
Not unless being good at using Google counts. Not unless you count my summer jobs as an early teen. ;) Let's see... it should be put into...
From what i gather, it sounds like it is capable of sniffing, logging, and remotely forwarding all your logins and passwords. Thank you Sprint,...
Carrier IQ as a platform is designed to collect "metrics" at any scale. What I found it to hook into is far beyond the scope of anything a carrier...
Taz, the presentation I gave was on the surveillance methods used by GCHQ and NSA on international communications, particularly fiber optic...
Pleonasm, Thanks for the opportunity to address your questions. The instability was due to DNS issues affecting route reachability, and has...
Expect it. You have no rights which you cannot forcibly exercise, that is what makes the truth of those rights self-evident.
Separate names with a comma.