Skip to main content

More right-solid
More right-solid
More right-solid
More right-solid
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Community Texts
by Akira Takahashi; Mehdi Tobouchi
texts
eye 3
favorite 0
comment 0
Topic: cryptography
Community Texts
texts
eye 731
favorite 4
comment 0
In this post-digital age, digital technology is no longer a revolutionary phenomenon but a normal part of everyday life. The mutation of music and film into bits and bytes, downloads and streams is now taken for granted. For the world of book and magazine publishing however, this transformation has only just begun. Still, the vision of this transformation is far from new. For more than a century now, avant-garde artists, activists and technologists have been anticipating the development of...
Topics: ebook, media, publishing
Libri
by Anna Busacchi
texts
eye 112
favorite 0
comment 0
Folkscanomy: Ham and Amateur Radio
by ARRL
texts
eye 1,872
favorite 1
comment 0
Collections of articles about wire antennas.
Topics: ARRL, antenna, wire antenna, radio amateur, diy, radioamateur
Folkscanomy: Ham and Amateur Radio
by ARRL
texts
eye 2,417
favorite 1
comment 1
The ARRL's antenna book for radio amateur
favoritefavoritefavoritefavorite ( 1 reviews )
Topics: arrl, radio, antenna, radioamateur
Folkscanomy: Ham and Amateur Radio
by ARRL
texts
eye 1,213
favorite 1
comment 0
The antenna book for radio amateur
Topics: antenna, radio, radioamateur, diy
Community Texts
by Ben Seri; Gregory Vishnepolsky; Dor Zusman
texts
eye 8
favorite 0
comment 0
Topics: BLE, bluetooth, RCE, CVE-2018-16986, security
Community Texts
by Carlo Breschi
texts
eye 2
favorite 0
comment 0
Topics: Indymedia, Indymedia, Indymedia Italia
Community Texts
by Cresson Kearny
texts
eye 131
favorite 1
comment 0
The purpose of this book is to provide Americans and other unprepared people with information and self-help instructions that will significantly increase their chances of surviving a nuclear attack.
Topics: war, nuclear war, survive, survival, DOE, USA
Community Texts
by crypto101.io
texts
eye 267
favorite 0
comment 0
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels.
Topics: howto, security, crypto, cryptography
Community Texts
by DEF CON Voting Village
texts
eye 277
favorite 1
comment 0
Report on Cyber Vulnerabilities in U.S. Election Equipment, Databases, and Infrastructure
Topics: voting, vote, voting machines, defcon, defcon25, election
Community Texts
by Dirk Loss, Tobias Limmer, Alecander von Gernler
texts
eye 16
favorite 0
comment 0
OpenSSH 5.1 introduced an ASCII-based visualization method for the remote servers’ public key fingerprints.  We explain the algorithm used to visualize the fingerprints and present some initial findings about its proper- ties.  Based on a Markov model and some brute-force attacks we were only able to produce some basic results.  But we hope that our analysis will spur further research on this topic, so that eventually it will be found out whether the (heuristically designed) algorithm is...
Community Texts
by Edward Snowden; Jenna Wortham; Cory Doctorow; Douglas Rushkoff; Malkia Cyril; Gabriela Coleman; Julia Angwin; Ethan Zuckerman; Elizabeth Stix; Ben Wizner; Jennifer Kabat; Camille Fassett; Thenmozhi Soundararajan; Bruce Schneier; Dave Maass; Sara Wachter-Boettcher
texts
eye 53
favorite 0
comment 0
Topics: privacy, technology, surveillange
Community Texts
by f-secure
texts
eye 3
favorite 0
comment 0
At F-Secure we care deeply about the security of your data and identity. This guide aims to provide comprehensive and e ective tips to protect your portable devices against tampering, a threat which unfortunately becomes more relevant to a wider audience in today’s cybersecurity threat landscape. In particular, this document focuses on the so called “evil maid” class of attacks. This rather catchy name was rst introduced 1 by Joanna Rutkowska in 2009 to identify the class of attacks that...
Topics: hack, hacking, security, evilmaid, attack
Community Texts
by f-secure
texts
eye 1
favorite 0
comment 0
At F-Secure we care deeply about the security of your data and identity. This guide aims to provide comprehensive and e ective tips to protect your portable devices against tampering, a threat which unfortunately becomes more relevant to a wider audience in today’s cybersecurity threat landscape. In particular, this document focuses on the so called “evil maid” class of attacks. This rather catchy name was rst introduced 1 by Joanna Rutkowska in 2009 to identify the class of attacks that...
Topics: hack, hacking, security, evilmaid, usb
Community Texts
texts
eye 2,054
favorite 0
comment 0
Community Texts
by fox-it.com
texts
eye 95
favorite 0
comment 0
Tempest attacks against AES. Covertly stealing keys for €200 Side-channel attacks can recover secret keys from cryptographic algorithms (including the pervasive AES) using measurements such as power use. However, these previously-known attacks on AES tend to require unrestricted, physical access to the device. Using improved antenna and signal processing, Fox-IT and Riscure show how to covertly recover the encryption key from two realistic AES-256 implementations while:  1. Attacking at a...
Topics: security, AES, tempest attack, attack, tempest
Community Video
by frontline
movies
eye 573
favorite 2
comment 0
One of the most requested programs in TV history - the story of a teacher's daring lesson in discrimination.
Topics: school, discrimination, racism, documentary, video
Community Texts
texts
eye 81
favorite 0
comment 0
Have you ever wanted to get into Android security? This is how we popped Galaxy S8 with 11+ bugs and features across 6 different applications! The final result is persistent code execution from clicking a hyperlink.
Topics: security, hack, andoid, pwn, mp2o, hacking, mobile
Community Texts
by Governmentattic.org
texts
eye 155
favorite 1
comment 0
In February of 2016, the people behind the website Government Attic made an unusual Freedom of Information Act request to the National Security Agency: "A digital/electronic copy of the NSA's old security posters from the 1950s and 1960s." It took more than two years, but the NSA finally got around to honoring the request—providing digital images of more than 100 posters from NSA's Security Education Program, spanning from the agency's early days in the 1950s up to the 1970s (with...
Topics: cold war, security, posters, propaganda, nsa
Community Texts
by Hakim Bey
texts
eye 178
favorite 0
comment 0
Immediatism by Hackim Bey
Topic: immediatism
Community Texts
texts
eye 5,263
favorite 9
comment 0
One of the most ambitious works of paranormal investigation of our time, here is an unprecedented compendium of pre-twentieth-century UFO accounts, written with rigor and color by two of today’s leading investigators of unexplained phenomena.
Topics: ufo, paranormal
Community Texts
by Joanna Rutkowska
texts
eye 104
favorite 0
comment 0
Modern Intel x86-based endpoint systems, such as laptops, are plagued by a number of security-related problems. Additionally, with the recent introduction of Intel Management Engine (ME) microcontroller into all new Intel processors, the trustworthiness of the Intel platform has been seriously questioned. In a recently published paper [ 10 ] the author has presented an in-depth survey of these topics. In this paper the author proposes what she believes might be a reasonable, practical and...
Topics: security, computer, laptop, paranoy
Community Texts
by Karl Wust; Arthur Gervais
texts
eye 6
favorite 0
comment 0
Topic: blockchain
Community Texts
by Matt Suiche
texts
eye 317
favorite 0
comment 0
Who are/is TheShadowBrokers? We have no clue. Nobody really does. The Shadow Brokers are one of most controversial characters of this Cyber-Era. The mysterious group emerged mid-summer 2016 when they started to anonymously, publicly drop tools and operational notes that allegedly belonged to the NSA Tailored Access Operations unit. This group referred to itself as The Shadow Brokers and quickly became the NSA’s worst nightmare since Edward Snowden.
Topics: cyber warfare, shado brokers, TAO, NSA, BHUSA, wannacry, hacking, black hat, russia
Community Texts
by Michael Smith; Craig Disselkoen; Shravan Narayan; Fraser Brown; Deian Stefan
texts
eye 4
favorite 0
comment 0
We present four new history sniffing attacks. Our attacks fit into two classical categories, visited-link attacks and cache-based attacks, but abuse new, modern browser fea- tures that do not account for privacy when handling cross-origin URL data.
Topics: privacy, Browser, Sniffing Attack
Community Video
movies
eye 21
favorite 0
comment 0
Naomi Klein on Hot to resist Trump's shock doctrine
Topics: trump, politics, resistance, civilrights
Community Texts
by NASA
texts
eye 19
favorite 0
comment 0
Topics: soldering, nasa
Community Images
by National Security Agency
image
eye 200
favorite 1
comment 0
In February of 2016, the people behind the website Government Attic made an unusual Freedom of Information Act request to the National Security Agency: "A digital/electronic copy of the NSA's old security posters from the 1950s and 1960s." It took more than two years, but the NSA finally got around to honoring the request—providing digital images of more than 100 posters from NSA's Security Education Program, spanning from the agency's early days in the 1950s up to the 1970s (with...
Topics: posters, nsa, security, propaganda, cold war
Community Texts
by Nick Bostrom
texts
eye 137
favorite 1
comment 0
This paper argues that at least one of the following propositions is true: (1) the human species is very likely to go extinct before reaching a “posthuman” stage; (2) any posthuman civilization is extremely unlikely to run a significant number of simulations of their evolutionary history (or variations thereof); (3) we are almost certainly living in a computer simulation. It follows that the belief that there is a significant chance that we will one day become posthumans who run...
Topics: philosophy, simulation, posthumanism, IA
Community Texts
by Nicolas Falliere, Liam O Murchu, Eric Chien
texts
eye 80
favorite 0
comment 0
W32.Stuxnet has gained a lot of attention from researchers and me- dia recently. There is good reason for this. Stuxnet is one of the most complex threats we have analyzed. In this paper we take a de- tailed look at Stuxnet and its various components and particularly focus on the final goal of Stuxnet, which is to reprogram industrial control systems. Stuxnet is a large, complex piece of malware with many different components and functionalities.
Topics: stuxnet, malware, cyberwar, cyberwarfare
Community Texts
by Ole Tange
texts
eye 139
favorite 1
comment 0
If you write shell scripts to do the same processing for different input, then GNU Parallel will make your life easier and make your scripts run faster.
Topics: gnu, linux, parallel, coding
Podcasts
by radiolab
audio
eye 88
favorite 0
comment 0
Last November, journalist Morgen Peck showed up at her friend Molly Webster's apartment in Brooklyn, told her to take her battery out of her phone, and began to tell her about The Ceremony, a moment last fall when a group of, well, let's just call them wizards, came together in an undisclosed location to launch a new currency. It's an undertaking that involves some of the most elaborate security and cryptography ever done (so we've been told). And math. Lots of math. It was all going great...
Topics: zcash, cryptocurrency, podcast, zooko
Libri
by Raffaele Martini
texts
eye 39
favorite 0
comment 0
Community Texts
by Ralph Langner
texts
eye 68
favorite 0
comment 0
A technical analysis of what Stuxnet's creators tried to achiveve. This document summarizes the most comprehensive research on the Stuxnet malware so far: It combines results from reverse engineering the attack code with intelligence on the design of the attacked plant and background information on the attacked uranium enrichment process. It looks at the attack vectors of the two different payloads contained in the malware and especially provides an analysis of the bigger and much more complex...
Topics: stuxnet, malware, cyberwar, cyberwarfare
Community Texts
by Ravishankar Borgaonkar; Lucca Hirschi; Shinjo Park; Altaf Shaik
texts
eye 30
favorite 0
comment 0
Topics: security, privacy, 3G, 4G, 5G
Topics: cyber, warfare, china
Community Texts
by Security and Exchange Commission
texts
eye 21
favorite 0
comment 0
The SEC’s Office of Investor Education and Advocacy is issuing this investor alert to warn individual investors about fraudulent investment schemes that may involve Bitcoin and other virtual currencies.
Topics: SEC, investors, cryptocurrencies, ICO
Community Texts
by Silvio Cesare
texts
eye 1
favorite 0
comment 0
Topics: Cache Poisoning, Hacking
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 169
favorite 1
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 147
favorite 1
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 195
favorite 2
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 143
favorite 1
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 134
favorite 0
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 129
favorite 1
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 136
favorite 1
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 114
favorite 1
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 130
favorite 0
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 185
favorite 0
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 175
favorite 1
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 118
favorite 2
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
collection
13
ITEMS
1,955
VIEWS
by Società Italiana per lo Studio degli Stati di Coscienza
collection
eye 1,955
La Società Italiana per lo Studio degli Stati di Coscienza e' sta fondata nel dicembre 1990. Essa si propone come sede aggregativa e di diffusione delle informazioni che riguardano il vasto e multidisciplinare campo di ricerca sugli stati di coscienza; un campo le cui tematiche possono spaziare dagli stati di possessione e di trance sciamaniche alla neurofisiologia degli stati estatici, dai nuovi movimenti religiosi e filosofici "psichedelici" alla storia del rapporto umano...
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Altrove
by Società Italiana per lo Studio degli Stati di Coscienza
texts
eye 140
favorite 1
comment 0
Topics: Psychopharmacology, Drugs, Psychedelics, Entheogens, SISSC, Anthropology
Community Texts
by Steven Englehardt, Jeffrey Han, Arvind Narayanan
texts
eye 23
favorite 0
comment 0
We show that the simple act of viewing emails contains privacy pitfalls for the unwary. We assembled a corpus of commercial mailing-list emails, and find a network of hundreds of third parties that track email recipients via methods such as embedded pixels. About 30% of emails leak the recipient’s email address to one or more of these third parties when they are viewed. In the majority of cases, these leaks are intentional on the part of email senders, and further leaks occur if the recipient...
Topics: email, privacy, tracking
Community Texts
by The Swedish Civil Contingencies Agency
texts
eye 63,119
favorite 0
comment 0
This brochure is being sent to all households in Sweden at the behest of the Swedish Government. The Swedish Civil Contingencies Agency (MSB) is responsible for its content. The purpose of the brochure is to help us become better prepared for everything from serious accidents, extreme weather and IT attacks, to military conflicts. Many people may feel a sense of anxiety when faced with an uncertain world. Although Sweden is safer than many other countries, there are still threats to our...
Topics: sweden, war
Community Video
movies
eye 21
favorite 0
comment 0
Leaked documents from pipeline security contractor TigerSwan had previously shown how the Sheriffs’ Association, a private organization operating with no public accountability or oversight, directly aided private military contractors in pushing pro-DAPL messaging as well as providing on-the-ground support. The National Sheriffs’ Association also played a key role in bringing out-of-state law enforcement to North Dakota under the Emergency Management Assistance Compact (EMAC). Their website...
Topics: nodapl, standing rock, tigerswan, national sheriff association, north dakota, pipeline
Community Video
movies
eye 46
favorite 0
comment 0
The left-leaning anti-fascist movement—or Antifa—has been around for decades, popping up in North America and Europe in response to rising white nationalist or fascist sentiments. Now, Antifa has made a resurgence in the US, where members clad in masks and nondescript black clothing physically confront groups of white supremacists and neo-Nazis who've started organizing in cities around the country.  Since the 2016 presidential election, Antifa has become a staple at alt-right and...
Topics: antifa, politics, activism, vice, blackblock
Community Video
movies
eye 19
favorite 0
comment 0
UNIMORE Università degli Studi di Modena e Reggio Emilia Dott. Pietro Bartolo, Dirigente Medico del presidio Sanitario di Lampedusa Ha scelto il Congresso Studentesco MoReMED il Dott. Pietro Bartolo , Dirigente Medico del presidio Sanitario di Lampedusa , per raccontare la vita dei migranti sull'isola. Di tutta risposta, gli oltre 800 giovani spettatori presenti al MoReMED, primo Congresso in Italia organizzato e rivolto a studenti di medicina, ha ringraziato il Dott. Bartolo per la preziosa...
Topics: Facebook, video, Piero Bartolo, Lampedusa, Immigration
Community Texts
by Wolfram, Stephen, author
texts
eye 2,816
favorite 4
comment 0
Includes bibliographical references and index
Topics: Wolfram language (Computer program language), Mathematica (Computer file)
Community Texts
by Yago Hansen
texts
eye 111
favorite 1
comment 0
Topics: hacking, hardware
Vacuum Tubes Radio Schematics
texts
eye 9
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Il Radio Giornale
texts
eye 19
favorite 0
comment 0
Vacuum Tubes Radio Schematics
texts
eye 27
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 10
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 16
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 8
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 7
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 13
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 7
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 10
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 12
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 15
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 13
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 12
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 9
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Radiorama
texts
eye 36
favorite 0
comment 0
Topics: Magazines, elettronica
Vacuum Tubes Radio Schematics
texts
eye 11
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 11
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 11
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 10
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Il Radio Giornale
texts
eye 13
favorite 0
comment 0
Vacuum Tubes Radio Schematics
texts
eye 8
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 8
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 12
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 9
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 9
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 11
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 10
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 10
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 10
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 9
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 13
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 12
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 15
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 9
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 10
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 8
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 11
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics
Vacuum Tubes Radio Schematics
texts
eye 10
favorite 0
comment 0
Topics: radio, schematics, Radio Schematics