-
```
sauron:~$ dbus-monitor --session interface=org.freedesktop.PowerManagement.Inhibit.
dbus-monitor: unable to enable new-style monitoring: org.freedesktop.DBus.Error.MatchRuleInvalid: "Interface n…
-
**[ UUID ]** 0f695b77-909a-4b7f-a87b-d05b95b4a3b7
**[ Session Name ]** Can You Keep a Secret? Learn to Send Encrypted Messages
**[ Primary Space ]** Privacy and Security
**[ Secondary Space ]** Y…
-
http://conference.hitb.org/hitbsecconf2016ams/sessions/forcing-a-targeted-lte-cellphone-into-an-eavesdropping-network/
-
We need attacks for the medium access control layer researched and developed. As a reference here is a list of some possible attacks in this layer that we have researched thus far:
1. **Jamming Att…
-
### Describe the bug
enabling system.etc.overlay = true throws away everything in /etc like /etc/ssh/known_hosts and /etc/shadow. Locking you out
### Steps To Reproduce
Steps to reproduce the be…
-
Since there is no mention of trusted boundaries or any assumptions in your README regarding SSL, this can be considered an exploited vulnerability.
Since the application is not SSL protected, uses …
-
The protocol currently has several security weaknesses that should be addressed:
- [x] 1. The initial handshake is neither encrypted, nor authenticated
- [ ] 2. Message headers are not encrypted
…
-
Connections to NB should be protected with HTTPS. Switching to HTTPS has numerous benefits:
* **Prevent credentials (passwords/cookies) from being stolen.** If an NB user is using a public wi-fi hots…
-
In order to prove equivalence between definitions, I want to prove that `A ~ D` assuming that `B ~ C`. However, the transitivity rules does not seem to support this use-case: if I do:
```
lemma Left…
-
Would you consider exposing some events to external eavesdropping?
In order for developers to be more flexible in controlling component details