Whitespace Esolang Covert Channel / Steganography

I’ve been always a fan of esoteric programming languages (esolangs). These programming languages are generally made just for fun, mostly in universities or for challenges. Wikipedia describes as the following: An esoteric programming language (esolang, in short) is a programming language designed to test the boundaries of computer programming language…

Plasma HTTP

Advert:Login:Online bot:offline bots:Commands:Statistics:Logs:Yeah take this lame article to second degree, i just talk about Plasma because i've promised to write something today on irc.I'm not dead but there nothing interesting to review for the moment, only crappy botsThat also one of the reason i haven't talked of JackPos and all…

Plasma HTTP

Advert:Login:Online bot:offline bots:Commands:Statistics:Logs:Yeah take this lame article to second degree, i just talk about Plasma because i've promised to write something today on irc.I'm not dead but there nothing interesting to review for the moment, only crappy botsThat also one of the reason i haven't talked of JackPos and all…

Plasma HTTP

Advert:Login:Online bot:offline bots:Commands:Statistics:Logs:Yeah take this lame article to second degree, i just talk about Plasma because i've promised to write something today on irc.I'm not dead but there nothing interesting to review for the moment, only crappy botsThat also one of the reason i haven't talked of JackPos and all…

Plasma HTTP

Advert:Login:Online bot:offline bots:Commands:Statistics:Logs:Yeah take this lame article to second degree, i just talk about Plasma because i've promised to write something today on irc.I'm not dead but there nothing interesting to review for the moment, only crappy botsThat also one of the reason i haven't talked of JackPos and all…

New York’s Finest OPSEC

NYPD Social Media Investigation OPSEC The NYPD created an operations formula for conducting undercover investigations on social media. The procedural document reveals the operational security for these investigations. The security is founded on the use of an “online alias” (the officer’s undercover account) and strict compartmentation. Given the capabilities of…

A Fistful of Surveillance

The publication of this piece at The Intercept about NSA targeting via mobile phones prompted me to release this collection of notes. Some quotes and statements in the article wrongly promote the idea that the SIM card is the only unique identifier in a mobile phone. I’ve enumerated the identifiers…