mslods.com
Tech + law policy reading list - suggestions welcome! - MsLods
http://mslods.com/2015/01/10/tech-law-policy-reading-list-suggestions-welcome
BEGIN TYPING YOUR SEARCH ABOVE AND PRESS RETURN TO SEARCH. PRESS ESC TO CANCEL. Where news, law and technology meet. January 10, 2015. June 3, 2015. Tech law policy reading list – suggestions welcome! Here’s some of the books on my reading list this year. By Julia Angwin –. By danah boyd –. Hacker, Hoaxer, Whistleblower, Spy. By Biella Coleman – on the growing pile next to my bed. Information Doesn’t Want To Be Free. By Cory Doctorow – on the growing pile next to my bed. 8216;s Data and Goliath. January ...
d4n3ws.polux-hosting.com
Black Hat 2015 : une partie du hack de Jeep sera dévoilé | .:[ d4 n3wS ]:.
http://d4n3ws.polux-hosting.com/2015/07/28/black-hat-2015-une-partie-du-hack-de-jeep-sera-devoile
Aller au contenu principal. Black Hat 2015 : une partie du hack de Jeep sera dévoilé. Juillet 28, 2015. Oui on est en retard sur cette info. Qui fait le buzz :. On pu littéralement pirater un. À distance et en prendre le contrôle. Depuis leur machine ils pouvaient, sans aucun contact physique préalable avec la voiture, contrôler la radio, l’affichage, les essuies glace mais aussi la direction et les freins… Un véritable cauchemar pour n’importe quel conducteur mais surtout pour. Au final, le groupe.
d4n3ws.polux-hosting.com
voiture | .:[ d4 n3wS ]:.
http://d4n3ws.polux-hosting.com/tag/voiture
Aller au contenu principal. Archives du mot-clé voiture. Certaines fonctions de la Nissan Leaf contrôlables à distance. Mars 2, 2016. S’est penché sur une appli mobile officielle permettant de gérer à distance certaines fonctionnalités de la voiture électrique de. Il a découvert en surveillant les communications que les échanges avec l’API ne nécessitaient aucune authentification. Rien de bien méchant contrairement au hack de Jeep. Mais pas de quoi rassurer les propriétaires de. Septembre 19, 2015. A gér...
d4n3ws.polux-hosting.com
Conférence / Hackerspace | .:[ d4 n3wS ]:.
http://d4n3ws.polux-hosting.com/tag/conference-hackerspace
Aller au contenu principal. Archives du mot-clé Conférence / Hackerspace. NetRipper : intercepter le trafic réseau pré-chiffrement. Août 15, 2015. Semble être un outil bien utile qui est capable de hooker certaines fonctions de l’API Windows pour accéder aux données avant quelles soient chiffrées ou au moment où elles sont transmises sur le réseau. Il se présente comme un outil de post-exploitation destiné à la capture de mots de passe et autre secrets. Usenix : Un autre hack de voiture à distance. Seule...
guerillero.net
wikipedia - Page 1 - Evolving Wilds
http://www.guerillero.net/tag/wikipedia
Undergrad Capstone Project Ideas. Build an ArcMap compatible geocoder for IP addresses that does not reply on a closed source database. Working on building the database could be a project within itself). Right now, you have to geocode with a propitiatory python library from a proprietary database. It would be nice to be able to do this with FOSS software and a FOSS database. Module and a more efficient way of handing imported data. Study the biases in the algorithms that run our lives. There is an Englis...
diaryofafreeman.com
Reading list | Diary of a free man
https://diaryofafreeman.com/reading-list
Diary of a free man. Skip to primary content. I wanted to create a section where I could highlight some books, videos, and podcasts that have I’ve enjoyed an that have been instrumental in shaping my views on various subjects. Perhaps you’ll find these works as thought-provoking as I have. Technology and Privacy Videos. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Email (Address never made public). Notify me of new comments via email.
conspiracy.ca
Gaming and Theatre «
http://conspiracy.ca/foreign-radical/gaming-and-theatre
An eye on the world. This Machine Kills Secrets. Published on: May 20, 2014. Interactive Storytelling: Video Games and the Theatre. Hosted by Playwrights Theatre Centre Kathleen Flaherty, tonight. Is an event that we’re looking forward to. The concept of game play within theatre performance is something Conspiracy has delved into with Kathleen in a big way over the past year as we’ve been developing. It didn’t make sense to have the audience passively watch. The game aspect of. In her research for. And c...
guerillero.org
wikipedia - Page 1 - Evolving Wilds
http://guerillero.org/tag/wikipedia
Undergrad Capstone Project Ideas. Build an ArcMap compatible geocoder for IP addresses that does not reply on a closed source database. Working on building the database could be a project within itself). Right now, you have to geocode with a propitiatory python library from a proprietary database. It would be nice to be able to do this with FOSS software and a FOSS database. Module and a more efficient way of handing imported data. Study the biases in the algorithms that run our lives. There is an Englis...
cpunks.wordpress.com
This Machine Kills Secrets | cypherpunks
https://cpunks.wordpress.com/2013/10/15/this-machine-kills-secrets/comment-page-1
Impacts of new technologies and regulations. Crypto, Privacy, Anonymity, Anitcorruption, FreeSpeech and NetFreedom. The Crypto Anarchist Manifesto. October 15, 2013. This Machine Kills Secrets. Andy Greenberg: This Machine Kills Secrets. How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information. Details: http:/ www.thismachinekillssecrets.com/. It’s a very good book and it would be nice to buy it! 8212;————————. Next post →. A Declaration of the Independence of Cyberspace. Ebook: ...
SOCIAL ENGAGEMENT