Finally UK Schedule 7 of the Terrorism Act 2000 is finally being enacted and is no longer an idle threat, so be aware it’s not only the USA that has these kind of draconian laws. A man who refused to share his phone and laptop passwords has been charged under Schedule 7, which is pretty […]
The Latest Privacy
Find the Best Privacy from 2018 here:
Github search is quite a powerful and useful feature and can be used to search for sensitive data in repositories, this Github security scanning tool comes with a collection of Github dorks that can reveal sensitive personal and/or other proprietary organisational information such as private keys, credentials, authentication tokens and so on. github-dork.py is a […]
spectrology is a Python-based audio steganography tool that can convert images to audio files with a corresponding spectrogram encoding, this allows you to hide hidden messages via images inside audio files. Using this tool you can select range of frequencies to be used and all popular image codecs are supported. Usage
usage: spectrology.py [-h] [-o OUTPUT] [-b BOTTOM] [-t TOP] [-p PIXELS]
INPUT Name of the image to be converted.
-h, --help show this help message and exit
-o OUTPUT, --output OUTPUT
Name of the output wav file. Default value: out.wav).
-b BOTTOM, --bottom BOTTOM
Bottom frequency range. Default value: 200.
-t TOP, --top TOP Top frequency range. Default value: 20000.
-p PIXELS, --pixels PIXELS
Pixels per second. Default value: 30.
-s SAMPLING, --sampling SAMPLING
Sampling rate. Default value: 44100.
python spectrology.py test.bmp -b 13000 -t 19000
The debate surrounding encryption backdoors has been raging on for years with governments (that typically don’t really understand the things they are pushing for) requesting all software have government ‘secured’ backdoor keys. This is now getting more serious in Europe with the EC actually forcing the issue (in a passive aggressive kind of way for […]
WikiLeaks has dropped another massive bomb called “Vault7“, basically a massive CIA leak which covers documents, correspondence, hacking tools, exploits and much more. It details sophisticated software tools and techniques used by the agency to break into smartphones, computers and even Smart TVs. The first installment published already contains 7,818 web pages with 943 attachments […]
There’s been a lot of buzz about this on Twitter, if you’re visiting the states anytime soon you might want to have your social media login credentials handy – as they might be requesting them at the border. I find the whole thing rather contrived though as I use 2FA for everything, so they are […]