- Cryptome
[wikipedia:] Cryptome is a website hosted in the United States since 1996 by independent scholars[1] and architects John Young and Deborah Natsios[2] that functions as a repository for information about freedom of speech, cryptography, spying, and surveillance. According to the site: Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance—open, secret and classified documents—but not limited to those.[3] Cryptome hosted documents, consisting of over 54,000 files,[4] include suppressed photographs of U.S. soldiers killed in Iraq, lists of people believed to be MI6 agents
in Public bookmarks with americas astronautics cpu cryptography geostrategy history military net science tutorial utils by 27 users
- Phone hacking, News International and operational disaster for News Corp by Guy Rundle | Crikey | 7 July 2011
Back in the day, the analogue and offline day, when a plenitude of images did not circulate, one of the most vital jobs in the newspaper industry was that of the “picture-snatcher”?—?the reporter, often a cub/cadet, who would accompany a senior colleague to the house of a grieving widow whose family member had just been trampled by a horse/died of dropsy/ etc, and, while the bereaved was being engaged in conversation, snatch a picture of the decedent from the mantelpiece, and then sprint back to the office with it.
in Public bookmarks with blogs cryptography geostrategy media net oz
- Security Videos (various authors)
A Penetration Attack Reconstructed.avi A Quick and Dirty Intro to Nessus using the Auditor Boot CD!.swf Adding Modules to a Slax or Backtrack Live CD from Windows.swf Airplay replay attack - no wireless client required.swf Anonym.OS LiveCD with build in Tor Onion routing and Privoxy.swf BackTrack LiveCD to HD Installation Instruction Video .swf Basic Nmap Usage!.swf Basic Tools for Wardriving!.swf Bluesnarfer attack tool demonstration.swf Bluesnarfing a Nokia 6310i hand set.avi Breaking WEP in 10 minutes.avi
in Public bookmarks with audio cryptography utils videofilm
- TrueCrypt: Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP/2000 and Linux
Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire hard disk partition or a storage device such as USB flash drive. * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography – more information may be found here). 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: LRW. Further information regarding features of the software may be found in the documentation.
TrueCrypt is free open-source disk encryption software for Windows and Linux. Categories: data encryption, security software, privacy.
encryption
in Public bookmarks with computer cryptography utils by 77 users
- wikipedia: Codex Seraphinianus
The Codex Seraphinianus is a book written and illustrated by the Italian architect and industrial designer Luigi Serafini during thirty months, from 1976 to 1978.[1] The book is approximately 360 pages long (depending on edition), and appears to be a visual encyclopedia of an unknown world, written in one of its languages, an incomprehensible (at least for us) alphabetic writing.
2009 april architecture articles asemic asimovs auto codex fiction from science seraphinianus statements unsourced with writing
in Public bookmarks with art cryptography history linglang science script by 3 users
- wikipedia: Voynich manuscript
The Voynich manuscript is a mysterious illustrated book with incomprehensible contents. It is thought to have been written between approximately 1450 and 1520 by an unknown author in an unidentified script and language. Over its recorded existence, the Voynich manuscript has been the object of intense study by many professional and amateur cryptographers, including some top American and British codebreakers of World War II fame (all of whom failed to decrypt a single word). This string of failures has turned the Voynich manuscript into a famous subject of historical cryptology, but it has also given weight to the theory that the book is simply an elaborate hoax — a meaningless sequence of arbitrary symbols.
2007 2008 alchemic articles february from languages manuscript october priori search special statements unsourced voynich with
in Public bookmarks with art cryptography history linglang science script by 2 users
- YouTube: Marble adding machine in wood
Matthias Wandel's astounding wooding calculatory enigma. A woodworker turns his talents to binary mathematics via a cunning series of cats-eyes, clinkers and rounders. Plus many other marbled wonders: Woodgears.ca <<mathematics>>
My marble adding machine in action. More at http://woodgears.ca/marbleadd
marbles
in Public bookmarks with computer cryptography fun science videofilm
- Commercial Telegraphic Code Books
Code books were used in the era of telegraphs (from 1845 until well into the second half of the 20th century) to shorten telegrams, which were paid for by the word. These books, arranged like dictionaries, would list many useful phrases or even sentences, each with its corresponding code word. One sent the code words, and the recipient of the telegram would have to look up their meanings in his copy of the code book. This could save quite a bit of money on intercontinental telegrams, since the price per word on undersea cable connections was very high. (The word cable means both the actual telegraph cable layed on the ocean bed, and to a cablegram sent over via the ``submarine telegraph,'' and then, as a verb, to send a cablegram, as in ``the arrest warrant
in Public bookmarks with cryptography media science
- From Tesla Motors to the “Patriot Hack” Martin Eberhard on Protecting Your Privacy Online
Nursing the best dark brew I’ve ever had, I moved from a great article on free global phone calls to another on the language of gang signs, ultimately landing on a column signed not with an anonymous pseudonym but by Martin Eberhard, co-founder of Tesla Motors. It was so interesting, in fact, that I reached out to Martin after my bear-rich Pacific Northwest roadtrip and asked for permission to reprint his article here. He graciously agreed. This article is broken up into four sections, which I titled: The Patriot Hack - From China’s Firewall to Lockpicking (15%) The Political and Technical Landscape (60%) Strategies to Protect Your Privacy (10%) The “Haystack” Call to Action (15%)
in Public bookmarks with blogs computer cryptography net
- In Defense of Piracy - WSJ.com by LAWRENCE LESSIG professor of law at Stanford Law School, and co-founder
In early February 2007, Stephanie Lenz's 13-month-old son started dancing. Pushing a walker across her kitchen floor, Holden Lenz started moving to the distinctive beat of a song by Prince, "Let's Go Crazy." He had heard the song before. The beat had obviously stuck. So when Holden heard the song again, he did what any sensible 13-month-old would do -- he accepted Prince's invitation and went "crazy" to the beat. Holden's mom grabbed her camcorder and, for 29 seconds, captured the priceless image of Holden dancing, with the barely discernible Prince playing on a CD player somewhere in the background.
in Public bookmarks with computer cryptography economylogy media net p2p
- Java Morse Code Translator
The Java Morse code translator translates to and from Morse code and can play the Morse to you as sound. It runs on your computer and therefore is very quick. You have full control over the speed, pitch and volume of the sounds. CGI Morse Code Translator
Morse code translator written in Java. The translator can translate to and from Morse code and can play the sound of the Morse code to you. The speed, pitch and volume of the sound are all fully adjustable.
code farnsworth fast free java javascript morse pitch sound speed translator volume
in Public bookmarks with computer cryptography linglang utils by 6 users
- Low Cost and Portable GPS Jammer
in Public bookmarks with computer cryptography science w4
- Schneier on Security: Anonymity and the Internet February 3, 2010
Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only the proper people have access to their own information. We'll know who is sending us spam and who is trying to hack into corporate networks. And when there are massive denial-of-service attacks, such as those against Estonia or Georgia or South Korea, we'll know who was responsible and take action accordingly. The problem is that it won't work. Any design of the Internet must allow for anonymity. Universal identification is impossible. Even attribution -- knowing who is responsible for particular Internet packets -- is impossible. Attempting to build such a system is futile, and will only give cr
in Public bookmarks with blogs cryptography geostrategy net
- Beyond The Beyond | playground for global guerrillas | By Bruce Sterling 100201
No rules: Internet security a Hobbesian "state of nature" Ars Technica By Nate Anderson | Last updated February 1, 2010
Life in cyberspace can be nasty, brutish, and short. So says a new report (PDF) on international cybersecurity, which argues that the Internet is a Hobbesian “state of nature” where anything goes, where even government attacks maintain “plausible deniability,” and where 80 percent of industrial control software is hooked into an IP network.
in Public bookmarks with cryptography geostrategy military net w4
Note: http://arstechnica.com/tech-policy/news/2010/02/no-rules-internet-security-a-hobbesian-state-of-nature.ars
- Hide data in files with easy steganography tools - Lifehacker
Unlike encryption, which obscures data in such a way that it's obvious someone's keeping something from listeners-in (and therefore heightens interest in that info), stego techniques offer no hint to the outsider that there's any private data contained within the visible file. Like hiding your valuables from burglars in an empty cereal box in your kitchen cabinet, steganography keeps the existence of the secret item from everyone but those in the know.
in Public bookmarks with computer cryptography utils
- How to Learn Morse Code
Morse Code was first used in the 1840s, and even after more than 160 years, it is still used today, especially by amateur radio operators. In 1844, Samuel F.B. Morse developed this code, which can be sent quickly over the telegraph. It's also useful for emergency signaling (SOS) with a radio, mirror, or flashlight, and even for people with severe disabilities to communicate. Plus, you can probably communicate faster with Morse code than you can with SMS text messaging![1] In order to master Morse code, however, you need to approach it like a new language. Here's how to get started.
in Public bookmarks with cryptography linglang media tutorial
- How to Mask Your IP and Use Country Restricted Services
A warning from our reader, Mark: ”Whoever runs that proxy can see all your internet communications - including MSN conversations and any passwords that are not encrypted! Use this at your own risk and do not transmit any sensitive data through the proxy unless you know and fully trust the person who runs it!”
in Public bookmarks with computer cryptography net
- How to Obscure Any URL
The URL (Universal Resource Locator) of the page you are now viewing is http://www.pc-help.org/obscure.htm. It is also http://3513587746@3484559912/o%62s%63ur%65%2e%68t%6D. Go ahead and click on that link. It'll take you right back to this very page. The weird-looking address above takes advantage of several things many people don't know about the structure of a valid URL. There's a little more to Internet addressing than commonly meets the eye; there are conventions which allow for some interesting variations in how an Internet address is expressed.
in Public bookmarks with computer cryptography net
- IP check
START TEST! Please click here to start the full anonymity test IP check and see all results. START TEST! Please click here to start the full anonymity test IP check and see all results. Make the anonymity test for your Tor/Torbutton or JonDonym/JonDoFox configuration! Visit this IP check regularly to see which new tests have been added meanwhile.
in Public bookmarks with computer cryptography net utils by 3 users
Note: http://forum.zebulon.fr/astuce-testez-votre-anonymit-sur-la-toile-t185894.html
http://fr.rsf.org/comment-blogger-de-maniere-anonyme-14-09-2005,14980
- IP Enforcement Directive 2: European Community goes criminal
Analysis of the IP Enforcement Directive text (IPRED2) proposed by the European Commission on 2 May 2006. The Commission bulldozes through criminal law, completely mixes up infringement and organised crime and at the same time manages to exceed its legislative competence.
in Public bookmarks with cryptography net p2p
Next »
cryptography from all users