Whatsapp privacy questions
Whatsapp as marketed is using end-to-end encryption in message transfer.i.e. if bob sends message to alice. only in this world alice has capability to decrypt that message.If alice meanwhile losses her set of pre-keys (ephemeral private keys) then those messages should remain un-decryptable forever (considering current state of hardware)Question:1 How can facebook ad and "Facebook families of companies" can utilize this data ? re:http://ift.tt/2rSXj8M2 When Bob uses two client (phone and chrome application). In ideal world of private communication there can not be anyway that ephemeral private keys leaves the client.How can Bob see message that Bob sent to alice from phone and his chrome app ?2.1. Are they sharing ephemeral private keys across device ?2.2. Are they treating each client as another user and self sending message ?3 Apart from this what metadata of messages are available to FB and what are they using for ?
Submitted October 26, 2017 at 07:45AM by 1ECx
via reddit http://ift.tt/2gJq9pn
Whatsapp as marketed is using end-to-end encryption in message transfer.i.e. if bob sends message to alice. only in this world alice has capability to decrypt that message.If alice meanwhile losses her set of pre-keys (ephemeral private keys) then those messages should remain un-decryptable forever (considering current state of hardware)Question:1 How can facebook ad and "Facebook families of companies" can utilize this data ? re:http://ift.tt/2rSXj8M2 When Bob uses two client (phone and chrome application). In ideal world of private communication there can not be anyway that ephemeral private keys leaves the client.How can Bob see message that Bob sent to alice from phone and his chrome app ?2.1. Are they sharing ephemeral private keys across device ?2.2. Are they treating each client as another user and self sending message ?3 Apart from this what metadata of messages are available to FB and what are they using for ?
Submitted October 26, 2017 at 07:45AM by 1ECx
via reddit http://ift.tt/2gJq9pn
WhatsApp.com
WhatsApp FAQ - How do I choose not to share my account information with Facebook to improve my Facebook ads and products experiences?
How do I choose not to share my account information with Facebook to improve my Facebook ads and products experiences? - If you are an existing user, you can choose not to share your account information with Facebook to improve your Facebook ads and products…
Security Now 634 IoT Flash Botnets | TWiT.TV
http://ift.tt/2zNJXg1
Submitted October 26, 2017 at 06:24AM by dmp1ce
via reddit http://ift.tt/2zPHUb0
http://ift.tt/2zNJXg1
Submitted October 26, 2017 at 06:24AM by dmp1ce
via reddit http://ift.tt/2zPHUb0
TWiT.tv
Security Now 634 IoT Flash Botnets | TWiT.TV
This week we discuss some ROCA fallout specifics, an example of PRNG misuse, the Kaspersky Lab controversy, a DNS security initiative for Android, another compromised download occu…
Automatic Boom Barriers
http://ift.tt/2yLTZ3i
Submitted October 26, 2017 at 12:50PM by anjali874
via reddit http://ift.tt/2gJV8BH
http://ift.tt/2yLTZ3i
Submitted October 26, 2017 at 12:50PM by anjali874
via reddit http://ift.tt/2gJV8BH
Fleet Tracking Services Indore
http://ift.tt/2gJZ19O
Submitted October 26, 2017 at 03:13PM by Easysecure
via reddit http://ift.tt/2yNQAkK
http://ift.tt/2gJZ19O
Submitted October 26, 2017 at 03:13PM by Easysecure
via reddit http://ift.tt/2yNQAkK
www.easysecure.co.in
Easy Secure GPS tracking device | Vehicle Security Device | Home security | Personal security | Fleet Security | Indore,India
Easy Secure is one of the best company which provide anti theft and anti hacking devices and services in Indore, India. Easy Secure provides all type of tracking solutions like Bike Tracking,Car tracking,Mobile tracking,Fleet tracking,Personal tracking and…
SSL|TLS Server Session
http://ift.tt/2y5fBs5
Submitted October 26, 2017 at 02:54PM by MicheeLengronne
via reddit http://ift.tt/2zRl0Ag
http://ift.tt/2y5fBs5
Submitted October 26, 2017 at 02:54PM by MicheeLengronne
via reddit http://ift.tt/2zRl0Ag
Limawi
SSL|TLS Server Session
SSL/TLS Server session protocol with Let’s Encrypt.
Any certificates I can get to have advantage in a job interview?
Hey guys. I am really interested in Information Security, tried applying for Security Intelligence Investigator job in United Kingdom and failed. The interview went well, I answered 90% of their questions and still was declined because of not having enough experience in IT. The job is mainly with LogRhytm tool. Analyzing threats. My question would be, what can I do to show them I am really prepared for the job? Any beginner certificates I can get? The requirements for that job are not very high. Thank you
Submitted October 26, 2017 at 02:43PM by bestr0ng
via reddit http://ift.tt/2xqdCKw
Hey guys. I am really interested in Information Security, tried applying for Security Intelligence Investigator job in United Kingdom and failed. The interview went well, I answered 90% of their questions and still was declined because of not having enough experience in IT. The job is mainly with LogRhytm tool. Analyzing threats. My question would be, what can I do to show them I am really prepared for the job? Any beginner certificates I can get? The requirements for that job are not very high. Thank you
Submitted October 26, 2017 at 02:43PM by bestr0ng
via reddit http://ift.tt/2xqdCKw
reddit
Any certificates I can get to have advantage in a job... • r/security
Hey guys. I am really interested in Information Security, tried applying for Security Intelligence Investigator job in United Kingdom and failed....
Should You Consider AI To Look After Your Network?
http://ift.tt/2zFdqHT
Submitted October 26, 2017 at 05:25PM by Uminekoshi
via reddit http://ift.tt/2ham2zk
http://ift.tt/2zFdqHT
Submitted October 26, 2017 at 05:25PM by Uminekoshi
via reddit http://ift.tt/2ham2zk
Nehemiah Security
Should you consider AI to look after your network - Nehemiah Security
With companies like Nehemiah Security and Darktrace increasingly relying on Artificial Intelligence (AI) to protect networks, what happens when AI starts looking after the machines? In the world of Elon Musk, this puts us one step closer to the ‘singularity’…
DUHK Crypto Attack Recovers Encryption Keys, Exposes VPN Connections, More
http://ift.tt/2xj4c3e
Submitted October 26, 2017 at 04:39PM by Octogev
via reddit http://ift.tt/2zRQMgD
http://ift.tt/2xj4c3e
Submitted October 26, 2017 at 04:39PM by Octogev
via reddit http://ift.tt/2zRQMgD
BleepingComputer
DUHK Crypto Attack Recovers Encryption Keys, Exposes VPN Connections, More
After last week we had the KRACK and ROCA cryptographic attacks, this week has gotten off to a similarly "great" start with the publication of a new crypto attack known as DUHK (Don't Use Hard-coded Keys)
Security In 5: Episode 98 - Create A Culture Of Security To Be Successful
http://ift.tt/2i6tkEe
Submitted October 26, 2017 at 06:36PM by BinaryBlog
via reddit http://ift.tt/2gFV0zz
http://ift.tt/2i6tkEe
Submitted October 26, 2017 at 06:36PM by BinaryBlog
via reddit http://ift.tt/2gFV0zz
Slack SAML authentication bypass
http://ift.tt/2gL33i1
Submitted October 26, 2017 at 07:05PM by asanso
via reddit http://ift.tt/2yU3mh1
http://ift.tt/2gL33i1
Submitted October 26, 2017 at 07:05PM by asanso
via reddit http://ift.tt/2yU3mh1
Intothesymmetry
Slack SAML authentication bypass
tl;dr I found a severe issue in the Slack 's SAML implementation that allowed me to bypass the authentication. This has now been solved by...
United States Considers Making Revenge Hacking Legal
http://ift.tt/2zI0Asi
Submitted October 26, 2017 at 07:32PM by BCNGroup
via reddit http://ift.tt/2hbbX5y
http://ift.tt/2zI0Asi
Submitted October 26, 2017 at 07:32PM by BCNGroup
via reddit http://ift.tt/2hbbX5y
BCN
Resources | BCN
Guidance and insight into IT services, Cloud technology, Microsoft 365 Business Support and Cyber Security.
BugOps vs. DevOps
http://ift.tt/2hbRb5F
Submitted October 27, 2017 at 12:59AM by ju1i3k
via reddit http://ift.tt/2zJ0Ze2
http://ift.tt/2hbRb5F
Submitted October 27, 2017 at 12:59AM by ju1i3k
via reddit http://ift.tt/2zJ0Ze2
Cobalt.io
BugOps vs. DevOps
DevOps aims to release code quickly with confidence. Frequent, fast releases aren’t the hard part. The challenge is achieving justifiable…
A Bug in a popular maritime platform left ships exposed
http://ift.tt/2yS542q
Submitted October 27, 2017 at 12:27AM by Octogev
via reddit http://ift.tt/2yMPUfp
http://ift.tt/2yS542q
Submitted October 27, 2017 at 12:27AM by Octogev
via reddit http://ift.tt/2yMPUfp
WIRED
A Bug in a Popular Maritime Platform Left Ships Exposed
The AmosConnect 8 web platform has vulnerabilities that could allow data to be exposed—underscoring deeper problems with maritime security.
SELinux disabling exploit for Linux 4.12-4.13
http://ift.tt/2ljpSea
Submitted October 26, 2017 at 03:48PM by memorycorrupt
via reddit http://ift.tt/2z9GuuY
http://ift.tt/2ljpSea
Submitted October 26, 2017 at 03:48PM by memorycorrupt
via reddit http://ift.tt/2z9GuuY
reddit
SELinux disabling exploit for Linux 4.12-4.13 • r/netsec
1 points and 1 comments so far on reddit
Advanced mobile penetration testing with Brida – Slides HackInBo 2017 WE
http://ift.tt/2hbOAIX
Submitted October 26, 2017 at 02:18PM by 0xdea
via reddit http://ift.tt/2i7pfPY
http://ift.tt/2hbOAIX
Submitted October 26, 2017 at 02:18PM by 0xdea
via reddit http://ift.tt/2i7pfPY
reddit
Advanced mobile penetration testing with Brida – Slides... • r/netsec
1 points and 0 comments so far on reddit
BoundHook Attack Exploits Intel Skylake MPX Feature
http://ift.tt/2zkeYqN
Submitted October 27, 2017 at 01:32AM by rediii123
via reddit http://ift.tt/2yUFiun
http://ift.tt/2zkeYqN
Submitted October 27, 2017 at 01:32AM by rediii123
via reddit http://ift.tt/2yUFiun
Threatpost | The first stop for security news
BoundHook Attack Exploits Intel Skylake MPX Feature
A new attack method takes advantage a feature in Intel’s Skylake microprocessor allowing for post-intrusion application hooking and stealth manipulation of applications.
"Elections in Kyrgyzstan 2017 – Exposing Samara, a fraudulent voter management system." A hacking scandal is brewing in my country, what do you guys think from technical perspective? As a layperson it's hard to judge the findings of this report...
http://ift.tt/2gNU7sn
Submitted October 27, 2017 at 02:05AM by positive_nancy
via reddit http://ift.tt/2iCmbzt
http://ift.tt/2gNU7sn
Submitted October 27, 2017 at 02:05AM by positive_nancy
via reddit http://ift.tt/2iCmbzt
Big data meets Big Brother as China moves to rate its citizens
http://ift.tt/2xUHGNG
Submitted October 27, 2017 at 02:15AM by dpgowan
via reddit http://ift.tt/2y7zf6G
http://ift.tt/2xUHGNG
Submitted October 27, 2017 at 02:15AM by dpgowan
via reddit http://ift.tt/2y7zf6G
WIRED UK
Big data meets Big Brother as China moves to rate its citizens
The Chinese government plans to launch its Social Credit System in 2020. The aim? To judge the trustworthiness – or otherwise – of its 1.3 billion residents
The Guardian view on internet security: complexity is vulnerable
http://ift.tt/2lkk5VI -internet-security-complexity-is-vulnerable
Submitted October 27, 2017 at 06:36AM by antdude
via reddit http://ift.tt/2y9oyAv
http://ift.tt/2lkk5VI -internet-security-complexity-is-vulnerable
Submitted October 27, 2017 at 06:36AM by antdude
via reddit http://ift.tt/2y9oyAv
reddit
The Guardian view on internet security: complexity is... • r/security
1 points and 0 comments so far on reddit
Deception-as-Detection - Deception based detection techniques mapped to MITRE's ATT&CK framework
http://ift.tt/2y7KCvq
Submitted October 27, 2017 at 04:04AM by netw0rm
via reddit http://ift.tt/2iDo92q
http://ift.tt/2y7KCvq
Submitted October 27, 2017 at 04:04AM by netw0rm
via reddit http://ift.tt/2iDo92q
GitHub
0x4D31/deception-as-detection
deception-as-detection - DaD :honeybee: Deception based detection techniques mapped to the MITRE’s ATT&CK framework
Cool blog post about reading packet captures
http://ift.tt/2iBVk6x
Submitted October 27, 2017 at 07:14AM by hwrd_rrk
via reddit http://ift.tt/2zaOv31
http://ift.tt/2iBVk6x
Submitted October 27, 2017 at 07:14AM by hwrd_rrk
via reddit http://ift.tt/2zaOv31
ProtectWise 401TRG
Triaging Large Packet Captures - 4 Key TShark Commands to Start Your Investigation
Triaging large packet captures is a daunting task, even for the most seasoned security analysts. With a mountain of data and few leads, analysts need to find ways to pare down what they've captured and focus on the areas that have the highest chance of producing…