|
 |
petergarner.net gopher root |
|
|
|
|
|
|
|
-- Cyber(space), Technical and Internet related --------------------- |
|
|
|
|
|
|
 |
Saving Lives with Connectivity: A Plan to Accelerate V2X Deployment |
application/pdf |
|
 |
Open-Source Software Security RFI Summary 2023 |
application/pdf |
|
 |
The Linux Kernel Module Programming Guide: Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang July 2024 (gopher.petergarner.bet) |
application/pdf |
|
 |
UK Government Cybersecurity Strategy 2022-2030 |
application/pdf |
|
 |
Man-Computer Symbiosis: IRE Transactions on Human Factors in Electronics, volume HFE-1, pages 4-11, March 1960 (gopher.petergarner.net70) |
application/pdf |
|
 |
JOCHEN LUDEWIG, UWE SCHULT, FRANK WANKMOLLER: CHASING THE BUSY-BEAVER - NOTES AND OBSERVATIONS ON A COMPETITION TO FIND THE 5-STATE BUSY BEAVER |
application/pdf |
|
 |
United States Patent #11998304 FitBit RING FOR OPTICALLY MEASURING BIOMETRIC DATA |
application/pdf |
|
 |
Failing the Fix: Grading laptop and cell phone companies on the fixability of their products (2024) |
application/pdf |
|
 |
The Evolution of Lisp (1993) |
application/pdf |
|
 |
Microsoft: Carbon-aware computing: Measuring and reducing the carbon footprint associated with software in execution |
application/pdf |
|
 |
Digitally enhanced brochure for the 1984 Apple Mac 128k computer |
application/pdf |
|
 |
Android 101: prepared for the US Court |
application/pdf |
|
 |
International Standards for Automatic Exchange of Information in Tax Matters: Crypto-Asset Reporting Framework and 2023 update to the Common Reporting Standard |
application/pdf |
|
 |
NCTC Report: Terrorist and Militant Attacks on Electricity Infrastructure Continue at High Rate |
application/pdf |
|
 |
The attack against Danish, critical infrastructure |
application/pdf |
|
 |
The Specops Weak Password Report 2023 |
application/pdf |
|
|
|
|
|
|
-- Reports by CCDH: Center for Countering Digital Hate - |
|
|
|
-- a controversial Think Tank. All opinions their own. |
|
|
|
|
|
|
 |
CCDH: Why platforms must act on twelve leading online anti-vaxxers |
application/pdf |
|
 |
CCDH: How ten fringe publishers fuel 69% of digital climate change denial |
application/pdf |
|
 |
CCDH: TikTok pushes harmful content promoting eating disorders and self-harm into users' feeds |
application/pdf |
|
 |
CCDH: How big tech powers and profits from David Icke's lies and hate, and why it must stop" |
application/pdf |
|
 |
CCDH: How Google profits by cleaning Big Oil's reputation |
application/pdf |
|
 |
CCDH: How Google profits from anti-choice ads distorting searches for reproductive healthcare |
application/pdf |
|
 |
CCDH: How Iran's press TV uses social media to promote anti-Jewish hatred |
application/pdf |
|
 |
CCDH: Submission to the White House Sept 2022 |
application/pdf |
|
 |
CCDH: How Twitter makes millions from anti-LGBTQ+ rhetoric |
application/pdf |
|
 |
CCDH: Report prepared for UK Parliament Public Bill Committee, Online Safety Bill |
application/pdf |
|
|
|
|
|
 |
Cyber threat report: UK Charity Sector (NCSC) |
application/pdf |
|
 |
Kevin Mitnick's statement to the US Senate: Cyber Attack: Is the Government Safe? |
text/plain |
|
 |
Thoughts on child safety on commodity platforms |
application/pdf |
|
 |
SECURING PRIVACY - Privacy International on End-to-End Encryption |
application/pdf |
|
 |
Draft Indian Telecommunication Bill, 2022 |
application/pdf |
|
 |
Tandy M100 service manual |
application/pdf |
|
 |
Escalation Risks of Intelligence Loss from Countercyber Operations in Crisis |
application/pdf |
|
 |
Soviet Computer Software and Applications in the 1980s |
application/pdf |
|
 |
Australian High Court rules against Google: hyperlinking is not publishing |
application/pdf |
|
 |
Sensitive Court Procedures Following SolarWinds Breach |
application/pdf |
|
 |
The Surreal Case of a C.I.A Hacker's Revenge |
application/pdf |
|
 |
Cyber Intelligence - Danchev Memoir |
application/pdf |
|
 |
Those Unspoken Thoughts: A study of censorship and media freedom in Manipur, India |
application/pdf |
|
 |
A taxonomy of internet shutdowns the technologies behind network interference |
application/pdf |
|
 |
Privacy International's report "Personal data and competition: Mapping perspectives, identifying challenges and enhancing engagement for competition regulators and civil society" |
application/pdf |
|
 |
Extended Analysis of “How Child Welfare Workers Reduce Racial Disparities in Algorithmic Decisions” |
application/pdf |
|
 |
FBI: Ransomware Attacks on Agricultural Cooperatives Potentially Timed to Critical Seasons |
application/pdf |
|
 |
Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure Alert AA22-110A |
application/pdf |
|
 |
Lapsus$, Okta and the Health Sector |
application/pdf |
|
 |
Apple's whitelist of auto-completable domains in iOS (JSON format) |
text/plain |
|
 |
So, you want to be a Darkweb Drug Lord... |
text/plain |
|
 |
The Microft Password Guide |
application/pdf |
|
 |
THE 2022 WEAK PASSWORD REPORT: An annual investigative look at the state of passwords. Specops. |
application/pdf |
|
 |
What Data Do The Google Dialer and Messages Apps On Android Send to Google? |
application/pdf |
|
 |
A Researcher’s Guide to Some Legal Risks of Security Research October 2020 |
application/pdf |
|
 |
St Louis Post-Dispatch publishes report re Missouri Governor Mike Parson's vow to prosecute a journalist for reporting a "security flaw" in a state website |
application/pdf |
|
 |
2014: Xerox scanners/photocopiers randomly alter numbers in scanned documents (German language) |
application/pdf |
|
 |
This World of Ours: James Mickens, Usenix August 2012 |
application/pdf |
|
 |
Does Transparency in Moderation Really Matter: User Behavior After Content Removal Explanations on Reddit |
application/pdf |
|
 |
2022/02/03 1408 Coll vs. Google Ruling on disclosure of legal funding arrangements |
application/pdf |
|
 |
Wearing Many Hats: the Rise of the Professional Security Hacker: Goerzen, Coleman |
application/pdf |
|
 |
"The Unix Time-sharing System" the 1978 BSTJ update of the 1974 C. ACM article by Richie and Ken Thompson originally describing Unix |
application/pdf |
|
 |
"The Evolution of the Unix Time-sharing System": an account of developments during 1968-1973 |
application/pdf |
|
 |
"A Stream Input/Output System" from AT&T Bell Laboratories Technical Journal, 1984 |
application/pdf |
|
 |
"Variable-size Arrays in C" a proposal of Richie's that appeared in Journal of C Language Translation, but is not the approach adopted for the 1999 ISO C standard |
application/pdf |
|
 |
"Recent Changes to C": from the 7th Edition manual |
application/pdf |
|
 |
The version of the C Reference Manual that came with 6th Edition Unix (May 1975), in the second volume entitled "Documents for Use With the Unix Time-sharing System" |
application/pdf |
|
 |
"Interprocess Communication in the Ninth Edition Unix System" with D. L. Presotto, from Software-Practice and Experience June 1990 |
application/pdf |
|
 |
OPT/Israel: Six Palestinian human rights defenders hacked with NSO Group’s Pegasus Spyware |
application/pdf |
|
 |
Bugs in our Pockets: The Risks of Client-Side Scanning |
application/pdf |
|
 |
Virtual Worlds, Real People: Human Rights in the Metaverse |
application/pdf |
|
 |
Re: Google Digital Advertising Antitrust Litigation (2nd Complaint) - Jury Trial Demanded |
application/pdf |
|
 |
CENTER FOR THE STUDY OF THE DRONE AT BARD COLLEGE: The Drone Database - March 2020 update |
application/pdf |
|
 |
CENTER FOR THE STUDY OF THE DRONE AT BARD COLLEGE: The Drone Database |
application/pdf |
|
 |
Advisoryreport on the Surveillance Legislation Amendment-IdentifyandDisrupt-Bill 2020.pdf |
application/pdf |
|
|
|
|
|
|
-- Google whistleblower Zach Vorhies walked out 950 pages of Google |
|
|
|
internal documents to the Department of Justice anti trust |
|
|
|
division detailing Google's extensive censorship project. |
|
|
|
This project is called "Machine Learning Fairness", which has |
|
|
|
already corrupted Google Search, YouTube and News products. |
|
|
|
This, along with various black lists and secret page rank scores |
|
|
|
is being used by Google to manipulate public opinion according |
|
|
|
to a hidden agenda. Enjoy! |
|
|
|
|
|
|
 |
AI-with-the-best fairness presentation |
application/pdf |
|
 |
Algorithmic Discrimination from an Environmental Psychology Perspective Stress-Inducing Differential Treatment |
application/pdf |
|
 |
Allegations of Algorithmic Bias Investigation and Meta-Analysis |
application/pdf |
|
 |
Attorney-Client Privileged_ Cloud DEI 2018 Planning |
application/pdf |
|
 |
BUSINESS Multicultural capacity framework - Robbins 2014 - rev. 4-11-17 |
application/pdf |
|
 |
Comms doc Fairness in machine learning |
application/pdf |
|
 |
Deck for participants- 2016-08 Serving Under-Represented Users in Recommenders with Focused Learning |
application/pdf |
|
 |
DeepMind MTV - Introduction to Equality, Diversity and Inclusion - Grow |
application/pdf |
|
 |
Definition of Algorithmic Unfairness - PRIVILEGED |
application/pdf |
|
 |
Expanding Collaboration for News Quality |
application/pdf |
|
 |
Fair is not the default (go fair-not-default) |
application/pdf |
|
 |
Feeding WebSpam manual actions to News (Design Doc) |
application/pdf |
|
 |
Fwd Fake News-letter 11 27 - Efforts to combat spread of (mis/dis)information - Google Groups |
application/pdf |
|
 |
go-ml-fairness |
application/pdf |
|
 |
Metrics and Measurements for Algorithmic Fairness in Machine Learning - Privileged |
application/pdf |
|
 |
ML Fairness |
application/pdf |
|
 |
ML Fairness-resources |
application/pdf |
|
 |
Page level domain restrction 2017_10_02 US Las-Vegas Attack Deadliest Us Mass Shooting Trend Index |
application/pdf |
|
 |
Privileged Confidential - ML Fairness Communication Best Practices |
application/pdf |
|
 |
Realtime Boost - DesignDoc |
application/pdf |
|
 |
RealtimeBoost Events DesignDoc |
application/pdf |
|
 |
Realtime Events - preso |
application/pdf |
|
 |
RMI Diversity Summit - Blaise 15m version (yes really) |
application/pdf |
|
 |
Search - Accelerated Mobile Pages (AMP) - Grow |
application/pdf |
|
 |
Seeds of Change- Root causes of algorithmic unfairness, and a path forward |
application/pdf |
|
 |
Sojourn - people |
application/pdf |
|
 |
The data on diversity - December 1, 2015 |
application/pdf |
|
 |
Training Global Google efforts to address Fake News - 2016 Q4 |
application/pdf |
|
 |
Twiddler Quick Start Guide - Superroot |
application/pdf |
|
 |
Unconscious Bias Cheat Sheet (for Perf) - Google Docs |
application/pdf |
|
 |
Unconscious Bias @ Work (Self Study Video) - Grow |
application/pdf |
|
 |
YouTube controversial query blacklist |
application/pdf |
|
 |
Google Leaks: Censorship Exposed: Zach Vorhies' Site (https://www.zachvorhies.com) |
|
|
|
|
|
|
|
-- A fine collection of Technically-oriented PDFs (Papers, Specs, |
|
|
|
-- Decks, Manuals, etc) compiled by Trent Nelson and dehain. |
|
|
|
-- Visit the full collection at https://github.com/tpn/pdfs |
|
|
|
|
|
|
 |
The TPN Technical PDF Collection |
|
|
|
|
|
|
|
-- |
|
|
|
|
|
|
 |
United States of America v Joseph James O’Connor Case No.3:21-mj-70812 MAG |
application/pdf |
|
 |
Divsion of local government and school accountability: Watervliet School IT Report |
application/pdf |
|
 |
Divsion of local government and school accountability: Westhill Central School IT Report |
application/pdf |
|
 |
Facebook's Coordinated Inauthentic Behavior Report June 2021 |
application/pdf |
|
 |
John McAfee - died today - Wikipedia as at 2012-06-24 |
application/pdf |
|
 |
APPLICATION FOR SEARCH WARRANT re An0m.pdf |
application/pdf |
|
 |
Pretty Good Phone Privacy: Schmitt, Raghavan |
application/pdf |
|
 |
Privacy Implications of Accelerometer Data: Kröger, Raschke, Bhuiyan |
application/pdf |
|
 |
The Commodore 64 Home Companion |
application/pdf |
|
 |
An Introduction to Ray-Tracing - Morgan Kauffman |
application/pdf |
|
 |
The Hitchhiker’s Guide to Online Anonymity v0.6.6 |
application/pdf |
|
 |
Apple: A Day in the Life of Your Data |
application/pdf |
|
 |
Cease and Desist letter from NPCC to Paul Moore re Cyberalarm software |
application/pdf |
|
 |
Taylor et al. vs Google Case 5:20-cv-07956 |
application/pdf |
|
 |
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics |
application/pdf |
|
 |
International Statement: End-To-End Encryption and Public Safety, OPA, DOJ |
application/pdf |
|
 |
Reform Think Tank-Resilient public services in an age of cyber threats |
application/pdf |
|
 |
Telecom Regulatory Authority of India: Highlights of subscription data 20200731 |
application/pdf |
|
 |
Microsoft Digital Defense Report 2020 September (30Mb) |
application/pdf |
|
 |
Competition document:Unmanned Air Systems in Urban Environments (MOD) |
application/pdf |
|
 |
CISA - Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity |
application/pdf |
|
 |
Multilateral Mutual Assistance & Cooperation Framework for Competition Authorities MOU |
application/pdf |
|
 |
A Guide to the IBM 3033 Processor, AP and MP Complex |
application/pdf |
|
 |
Linux Productivity Tools (Ketan M, Oak Ridge National Laboratory) |
application/pdf |
|
 |
Technical,Legal Review of the Stopp Corona App by the Austrian Red Cross |
application/pdf |
|
 |
Terbium Labs: Data: The Business World's Most Vulnerable Commodity |
application/pdf |
|
 |
Do Cookie Banners Respect my Choice - Matte,Bielova,Santos |
application/pdf |
|
 |
Root DNSSEC KSK Ceremony 403 |
application/pdf |
|
 |
Snowden's Permanent Record - Chinese CN edition with underlined redactions |
application/pdf |
|
 |
Investigation into the Use of Data-analytics in Political Campaigns: final 20181105 |
application/pdf |
|
 |
Description of 1,027,871 images from 50,000unique hotels around the world dataset |
application/pdf |
|
 |
Rollback an apt-get upgrade if something goes wrong on Debian / Ubuntu Linux |
application/pdf |
|
 |
Internet accessible devices; obscenity filtering (State of Arizona) |
application/pdf |
|
 |
Security and Privacy in Computer Systems (Willis H Ware Apri 1967) |
application/pdf |
|
 |
Integrating Artificial Intelligence into Weapon Systems |
application/pdf |
|
 |
Defendent Apple Inc's Motion To Dismiss Plaintiffs' 2nd Amended Complaint (battery/slowdown) |
application/pdf |
|
 |
The Cyber Security Body Of Knowledge v1.0 |
application/pdf |
|
 |
Google Report: The Hunt for 3ve |
application/pdf |
|
 |
Ofcom: UK Communications Market Report 2018 |
application/pdf |
|
 |
Robust Website Fingerprinting Through the Cache Occupancy Channel |
application/pdf |
|
 |
UK’s Critical National Infrastructure Third Report of Session 2017–19 |
application/pdf |
|
 |
ATM logic attacks: scenarios |
application/pdf |
|
 |
Audit of the acute kidney injury detection system known as Streams Royal Free London NHS Foundation Trust |
application/pdf |
|
 |
Apple T2 Security Chip Security Overview October 2018 |
application/pdf |
|
 |
Consultation on revised assessment arrangements for GCSE computer science |
application/pdf |
|
 |
After the Reboot - Computing Education in UK Schools |
application/pdf |
|
 |
Self-encrypting deception: weaknesses in the encryption of solid state drives |
application/pdf |
|
 |
The Case for the Web - a proposed charter for Netizens |
application/pdf |
|
 |
Taamneh vs Twitter |
application/pdf |
|
 |
China Telecom's BGP Hijacking |
application/pdf |
|
 |
Code of Practice for Consumer IoT Security Oct 2018 |
application/pdf |
|
 |
onsumer_Guidance_for_Smart_Devices_in_the_Home_Oct_2018 |
application/pdf |
|
 |
Mapping of IoT: Security Recommendations,Guidance,Standards Oct 2018 |
application/pdf |
|
 |
Insight Intelligent Technology Index 2018 |
application/pdf |
|
 |
The Stroz Report |
application/pdf |
|
 |
Google vs Levandowski: engineer went to Uber |
application/pdf |
|
 |
Accelerating Wireline Broadband Deployment by Removing Barriers to Infrastructure Investment |
application/pdf |
|
 |
City_of_Philadelphia_Comments_to_Draft |
application/pdf |
|
 |
FCC FACILITATES DEPLOYMENT OF WIRELESS INFRASTRUCTURE FOR 5G CONNECTIVITY |
application/pdf |
|
 |
Migrating an old Mac Mini work environment to a Raspberry Pi |
application/pdf |
|
 |
Yet Another Wireless Access Project (YARWAP): Billy Nomad |
application/pdf |
|
 |
Machine Learning Algorithms and Police Decision-Making: Legal, Ethical and Regulatory Challenges |
application/pdf |
|
 |
OpenEMR v5.0.1.3 - Vulnerability Report - Project Insecurity - insecurity.sh |
application/pdf |
|
 |
The MSB 2018 Virus Situation as of 3oth July 2018 by Eric Wyatt |
application/pdf |
|
 |
Open Rights Group: Age Verification Briefing 08/2018 |
application/pdf |
|
 |
Under The Hoodie - pentesting 2018 report |
application/pdf |
|
 |
Teach 'em to Phish - Privacy International report |
application/pdf |
|
 |
Are your cookies telling your fortune: analysis of weak cookie secrets and OSINT |
application/pdf |
|
 |
Stuxnet: (how to) kill a centrifuge |
application/pdf |
|
 |
The AWK Programming Language (1988) |
application/pdf |
|
|
|
|
|
|
Related to British Board of Film Censors (BBFC) in their role as |
|
|
|
Managers of the UK Government Age Verification System for adult |
|
|
|
websites. |
|
|
|
|
|
|
 |
BBFC: Draft Guidance on Age-verification Arrangements and Draft Guidance on Ancillary Service Providers |
application/pdf |
|
 |
BBFC: UPDATED Draft Guidance On Age Verification Arrangements, Draft Guidance On Ancillary Service Providers |
application/pdf |
|
 |
BBFC: Guidance on Age-verification Arrangements Submitted to the Secretary of State pursuant to section 25 of the Digital Economy Act 2017 |
application/pdf |
|
 |
BBFC: Memorandum of understanding between the ICO and BBFC |
application/pdf |
|
 |
BBFC: Memorandum of understanding between the IWF and BBFC |
application/pdf |
|
|
|
|
|
|
Speakers notes from the Defcon 25 conference in Las Vegas |
|
|
|
|
|
|
 |
DEFCON 25: 0ctane Untrustworthy Hardware |
application/pdf |
|
 |
DEFCON 25: Alvaro Munoz JSON attacks |
application/pdf |
|
 |
DEFCON 25: Andrew Robbins and Will Schroeder An Ace Up The Sleeve |
application/pdf |
|
 |
DEFCON 25: Artem Kondratenko Cisco Catalyst Exploitation |
application/pdf |
|
 |
DEFCON 25: Ayoul3 Dealing the Perfect Hand Shuffling memory blocks on zOS |
application/pdf |
|
 |
DEFCON 25: Caleb Madrigal IOT Hacking With SDR |
application/pdf |
|
 |
DEFCON 25: Chris Thompson MS Just Gave The Blue Teams Tactical Nukes |
application/pdf |
|
 |
DEFCON 25: Christopher Domas Breaking The x86 ISA |
application/pdf |
|
 |
DEFCON 25: Cincvolflt Inside The Meet Desai Attack |
application/pdf |
|
 |
DEFCON 25: Damien Cauquil Weaponizing the BBC MicroBit |
application/pdf |
|
 |
DEFCON 25: Daniel Bohannon and Lee Holmes Revoke Obfuscation |
application/pdf |
|
 |
DEFCON 25: Datko and Quartier Breaking Bitcoin Hardware Wallets |
application/pdf |
|
 |
DEFCON 25: Dhia Mahjoub and Thomas Mathew Malicious CDNs Identifying Zbot Domains en Masse |
application/pdf |
|
 |
DEFCON 25: Foofus Secret Tools Learning About Gov Surveillance Software |
application/pdf |
|
 |
DEFCON 25: Gabriel Ryan Advanced Wireless Attacks Against Enterprise Networks Course Guide |
application/pdf |
|
 |
DEFCON 25: Gabriel Ryan Advanced Wireless Attacks Against Enterprise Networks Lab Setup Guide |
application/pdf |
|
 |
DEFCON 25: Gabriel Ryan Advanced Wireless Attacks Against Enterprise Networks |
application/pdf |
|
 |
DEFCON 25: Gerald Steere and Sean Metcalf Hacking the Cloud |
application/pdf |
|
 |
DEFCON 25: Gil Cohen Call The Plumber You Have A Leak In Your (named) Pipe |
application/pdf |
|
 |
DEFCON 25: Hanno Boeck Abusing Certificate Transparency Logs |
application/pdf |
|
 |
DEFCON 25: Haoqi Shan and Jian Yuan Man in the NFC |
application/pdf |
|
 |
DEFCON 25: Hernandez Richards MacDonald Evoy Tracking Spies in the Skies |
application/pdf |
|
 |
DEFCON 25: Hyrum Anderson Evading Next Gen AV Using AI |
application/pdf |
|
 |
DEFCON 25: Ilja van Sprundel BSD Kern Vulns |
application/pdf |
|
 |
DEFCON 25: Inbar and Eden Story of Early Israeli Hacking Community |
application/pdf |
|
 |
DEFCON 25: Jesse Michael and Mickey Shkatov Driving Down the Rabbit Hole |
application/pdf |
|
|
|
|
|
 |
Baloch: Bypassing Browser Security Policies For Fun And Profit |
application/pdf |
|
 |
The State of Surveillance in 2018 - BigBrotherWatch |
application/pdf |
|
 |
ICANN: WHOIS, GDPR Article 29 working party memo |
application/pdf |
|
 |
ICANN: Proposed temporary spec of gTLD registration data |
application/pdf |
|
 |
Phrack Magazine: Attacking JavaScript Engines |
text/plain |
|
 |
Julian Assange's statement November 14/15th 2016 |
application/pdf |
|
 |
ONS Report: Internet Access Households & Individuals 2016 |
application/pdf |
|
 |
Information Security for Journalists v1.3 |
application/pdf |
|
 |
BBS Lists: Os/2 BBS |
text/plain |
|
 |
"What would you like to see to see most in Minix?" A question by some guy called Torvalds |
application/pdf |
|
 |
D1 COMMSEC - Elisabeth de Leeuw - Unformation in the Era of Hyper Connectivity |
application/pdf |
|
 |
D1 COMMSEC - Marc Newlin - Applying Regulatory Data to IoT RF Reverse Engineering |
application/pdf |
|
 |
D1 COMMSEC - Martin Knobloch - Dont Feed the Hippos |
application/pdf |
|
 |
D1 COMMSEC - Nadav Markus and Gal De Leon - Exploiting GLIBC - Hacking Everything |
application/pdf |
|
 |
D2 COMMSEC - Mattijs van Ommeren - A Series Of Unfortunate Events - Where Malware Meets Murphy |
application/pdf |
|
 |
D1T1 - Jacob Torrey - Using the Observer Effect and Cyber Fengshui |
application/pdf |
|
 |
D1T1 - Lin Huang - Forcing a Targeted LTE Cellphone into an Eavesdropping Network |
application/pdf |
|
 |
D1T1 - Nick Biasini - Exploit Kits - Hunting the Hunters |
application/pdf |
|
 |
D1T1 - Radu Caragea - Peering into the Depths of TLS Traffic in Real Time |
application/pdf |
|
 |
D1T1 - Shengping Wang and Xu Liu - Escape From The Docker-KVM-QEMU Machine |
application/pdf |
|
 |
D1T1 - Tang Qing Hao - Virtualization System Vulnerability Discovery Framework |
application/pdf |
|
 |
D1T2 - Broderick Aquilino and Wayne Low - Kernel Exploit Hunting and Mitigation |
application/pdf |
|
 |
D1T2 - Chilik Tamir - Profiting from iOS Malware |
application/pdf |
|
 |
D1T2 - Michele Spagnuolo and Lukas Weichselbaum - CSP Oddities |
application/pdf |
|
 |
D1T2 - Tim Xia - Adaptive Android Kernel Live Patching |
application/pdf |
|
 |
D1T2 - Yann Allain and Julien Moinard - Hardsploit Project |
application/pdf |
|
 |
D1T3 - Gustavo Grieco - Vulnerability Discovery Using Machine Learning |
application/pdf |
|
 |
D1T3 LABS - Anto Joseph - Droid-FF |
application/pdf |
|
 |
D2T1 - Anders Fogh - Cache Side Channel Attacks |
application/pdf |
|
 |
D2T1 - Felix Wilhelm - Attacking Next Generation Firewalls |
application/pdf |
|
 |
D2T1 - Jun Li - CANSsee - An Automobile Intrusion Detection System |
application/pdf |
|
 |
D2T1 - Yuwei Zheng and Haoqi Shan - Forging a Wireless Time Signal to Attack NTP Servers |
application/pdf |
|
 |
D2T1 Itzik Kotler and Amit Klein - The Perfect Exfiltration Technique |
application/pdf |
|
 |
D2T2 - Mikhail Egorov and Sergey Soldatov - New Methods for Exploiting ORM Injections in Java Applications |
application/pdf |
|
 |
D2T2 - Peter blasty Geissler - Breaking Naive ESSID WPA2 Key Generation Algorithms |
application/pdf |
|
 |
D2T2 - Richard Johnson - Go Speed Tracer - Guided Fuzzing |
application/pdf |
|
 |
D2T2 - Shangcong Luan - Xen Hypervisor VM Escape |
application/pdf |
|
 |
D2T2 - Wish Wu - Perf - From Profiling to Kernel Exploiting |
application/pdf |
|
 |
D2T3 LABS - Matteo Beccaro - Electronic Access Control Security |
application/pdf |
|
 |
KEYNOTE 1 - John Adams - Beyond FBI v Apple |
application/pdf |
|
 |
KEYNOTE 2 - Adam Laurie - The Future Has Arrived and its Effin Hilarious |
application/vnd.oasis.opendocument.presentation |
|
 |
The rise and fall of the Gopher protocol-MinnPost |
application/pdf |
|
 |
CLOSING KEYNOTE - Sophia D Antoine - Hardware Side Channels in Virtualized Environments |
application/pdf |
|
 |
Assange: "Google is not what it seems" |
application/pdf |
|
 |
Do You See What I see? Differential of Anonymous Users |
application/pdf |
|
 |
The Dutch Government Position on Encryption [original Dutch].txt |
text/plain |
|
 |
The Dutch Government Position on Encryption [machine_translated].txt |
text/plain |
|
 |
Don't throw away your old_boarding pass |
application/pdf |
|
 |
Government Cellphone Surveillance Equipment Catalogue |
application/pdf |
|
 |
Kazakhstan Telecom notifies on introduction of national security certificate from January 2016 |
text/plain |
|
 |
Perl 6 Introduction |
application/pdf |
|
 |
Megaupload: the Copyright Lobby and the Future of Digital Rights |
application/pdf |
|
 |
Megaupload: Affidavit of Lawrence Lessig September 2015 |
application/pdf |
|
 |
Covert Communication in Mobile Applications 2015 |
application/pdf |
|
 |
NSA Journal of Information Warfare 2015 |
application/pdf |
|
 |
NSA Journal of Information Warfare 2014 |
application/pdf |
|
 |
EFF Report on colour printers that watermark each doc printed |
application/pdf |
|
 |
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice |
application/pdf |
|
 |
TOR browser forensics on Windows OS (short).pdf |
application/pdf |
|
 |
Microsoft: a History of Anticompetitive Behaviour and Consumer Harm (2009) |
application/pdf |
|
 |
The Web's Shadiest (TLD) Neighbourhoods |
application/pdf |
|
 |
Wifi Bedouin - Julian Bleecker's project that spawned the PirateBox |
application/pdf |
|
 |
Location Tracking using Mobile Device Power Analysis |
application/pdf |
|
 |
Equation Group: questions and answers. Report by Kaspersky |
application/pdf |
|
 |
SOHO Pharming: a Team Cymru report on the scale of home/SOHO router exploits |
application/pdf |
|
 |
Draft Declaration of Internet Rghts |
application/pdf |
|
 |
"Chattering Laptops" - think you're anonymous? Er, no |
application/pdf |
|
 |
The (real) Matrix - via The Hidden Wiki |
application/pdf |
|
 |
A Question of Momentum - Critical Reflections on Individual Options for Surveillance Resistance.pdf |
application/pdf |
|
 |
Understanding Counter-surveillance as Critical Discourse and Practice.pdf |
application/pdf |
|
 |
POST note discussing the state of UK data encryption in 2006 |
application/pdf |
|
 |
POST note discussing Tor, the Dark Net and Online Anonymity |
application/pdf |
|
 |
142,635,139 emails inspected by Mimecast; report |
application/pdf |
|
 |
Western Australian Auditor General’s Report: IT systems 2018 |
application/pdf |
|
 |
A collection of *nix Sysadmin Test Questions and Answers for Interview/Exam (2018 Edition) |
application/zip |
|
 |
PHP 4.0 documentation as big html |
application/octet-stream |
|
 |
A framework for progressive engagement of staff in cyber security |
application/pdf |
|
 |
Why Johnny Can’t Encrypt-Usability Evaluation of PGP 5.0 |
application/pdf |
|
 |
Why Johnny -Still- Can’t Encrypt Evaluating the Usability of a Modern PGP_Client |
application/pdf |
|
 |
Bitreich.org Gopherish-themed radio interview (bitreich.org) |
|
|
 |
Google Data Collection: Professor Douglas C Schmidt Professor of Computer Science Vanderbilt University |
application/pdf |
|
 |
The Linux distro family tree |
image/png |
|
 |
How Perl Saved the Human Genome Project.txt |
text/plain |
|
 |
Understanding and Characterizing Interception of the DNS Resolution Path |
application/pdf |
|
 |
Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures |
application/pdf |
|
 |
Freeing the Web from the Browser: Revisiting Open Hypermedia (Savage, J: Univeristy of Bath) |
application/pdf |
|
 |
A Two-Phase Usability Study of the FIDO U2F Security Key |
application/pdf |
|
 |
Do a robot’s social skills and its objection discourage it being switched off (Horstmann et al) |
application/pdf |
|
 |
Easy-read guide to LED safety |
application/pdf |
|
 |
Potential Human Health Risks of LEDs - Sheer, Final |
application/pdf |
|
 |
Results of public consultation on Scheer's preliminary opinion on LEDs |
application/pdf |
|
 |
ERP Applications Under Fire - Onapsis - July 2018 |
application/pdf |
|
 |
FTC Consumer Sentinel Data Book 2017 - Fraud, Theft Report |
application/pdf |
|
 |
The 8 Fallacies of Distributed Computing |
application/pdf |
|
 |
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning |
application/pdf |
|
 |
Forensic Analysis and Anonymisation of Printed Documents |
application/pdf |
|
 |
Identification and Obfuscation of Social Media Users using metadata |
application/pdf |
|
 |
The Commodore 64 design from 1985 |
application/pdf |
|
 |
Deceived by design: User Interface Dark Patterns (Google, Facebook) |
application/pdf |
|
 |
Inference Attacks by Malicious Batteries on Mobile Devices |
application/pdf |
|
 |
Experimental Security Assessment of BMW Cars by KeenLab (summary).pdf |
application/pdf |
|
 |
Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels (draft 0.9.0) |
application/pdf |
|
 |
A PDF containing an overview and alphabetical listing of Windows commands |
application/pdf |
|
 |
Center for Internet Security Benchmark: Debian 1.0 2007 |
application/pdf |
|
 |
BBC:Microbit A quick-start guide for Teachers |
application/pdf |
|
 |
State Considered Harmful: a proposal for a stateless laptop - Rutkowska |
application/pdf |
|
 |
Intel X86 Considered Harmful - Rutkowska |
application/pdf |
|
|
|
|
|
|
Dennis Yurichev's incredible guide to Reverse-Engineering |
|
|
|
|
|
|
 |
Reverse Engineering for Beginners: full version, A4 size |
application/pdf |
|
 |
Reverse Engineering for Beginners: lite version, A4 size |
application/pdf |
|
 |
Reverse Engineering for Beginners: full version, A5 (ebook) size |
application/pdf |
|
 |
Reverse Engineering for Beginners: lite version, A5 (ebook) size |
application/pdf |
|
 |
SSH Mastery: OpenSSH, PUTTY, Tunnels and Keys by Michael W Lucas |
application/pdf |
|
 |
Using malware for money? Read this "study on incentivizing users to ignore security advice |
application/pdf |
|
 |
Linux ate my RAM!! Er, not really.. |
text/plain |
|
 |
NSA Converged Analysis of Smartphone Devices (May 2010) |
application/pdf |
|
 |
Purpose of the Best1_User account created by the BMC Performance Assurance installation |
application/pdf |
|
 |
Spoiled Onions: Exposing Malicious Tor Exit Relays |
application/pdf |
|
 |
Raspberry Pi verified peripherals Jan 2014 |
text/plain |
|
 |
The essential GPG crib sheet |
text/plain |
|
 |
A Howto guide for Linux and Open Source software |
text/plain |
|
 |
Linux essentials: the complete introduction |
application/pdf |
|
 |
User Guide for the original Mac Mini PPC |
application/pdf |
|
 |
UK Crypto Laws 2013 |
application/pdf |
|
 |
What hard drive should I buy - via Backblaze blog |
application/pdf |
|
 |
The original Billy Nomad Project notes from 2004 |
application/pdf |
|
 |
Uniform Resource Identifier (URI) Schemes (http://www.iana.org) |
application/xhtml+xml |
|
 |
Meulie.net Gopher Proxy Statistics (we're in there!) (http://gopherproxy.meulie.net) |
|
|
|
|
|
|
|
Proxy List |
|
|
|
|
|
|
 |
Full list of free, public, forward proxy servers (updated daily) |
text/plain |
|
 |
List of free, public, forward proxy servers (updated daily) JUST THE IP+PORT |
text/plain |
|
|
|
|
|
|
IETF RFCs |
|
|
|
|
|
|
 |
Citations for all RFCs in numeric order (updated daily) |
text/plain |
|
 |
RFC1436 - The Internet Gopher Protocol |
text/plain |
|
 |
RFC2378 - The CCSO Nameserver (Ph) Architecture |
text/plain |
|
 |
RFC4266 - The Gopher URI scheme |
text/plain |
|
|
|
|
|
|
UPDATED OFTEN |
|
|
|
|
|
|
 |
Ages of MAC addresses scraped from the web (CSV) |
text/csv |
|
|
|
|