SMOLNET PORTAL home about changes
(DIR) petergarner.net gopher root
-- Cyber(space), Technical and Internet related ---------------------
(BIN) Saving Lives with Connectivity: A Plan to Accelerate V2X Deployment application/pdf
(BIN) Open-Source Software Security RFI Summary 2023 application/pdf
(BIN) The Linux Kernel Module Programming Guide: Peter Jay Salzman, Michael Burian, Ori Pomerantz, Bob Mottram, Jim Huang July 2024 (gopher.petergarner.bet) application/pdf
(BIN) UK Government Cybersecurity Strategy 2022-2030 application/pdf
(BIN) Man-Computer Symbiosis: IRE Transactions on Human Factors in Electronics, volume HFE-1, pages 4-11, March 1960 (gopher.petergarner.net70) application/pdf
(BIN) JOCHEN LUDEWIG, UWE SCHULT, FRANK WANKMOLLER: CHASING THE BUSY-BEAVER - NOTES AND OBSERVATIONS ON A COMPETITION TO FIND THE 5-STATE BUSY BEAVER application/pdf
(BIN) United States Patent #11998304 FitBit RING FOR OPTICALLY MEASURING BIOMETRIC DATA application/pdf
(BIN) Failing the Fix: Grading laptop and cell phone companies on the fixability of their products (2024) application/pdf
(BIN) The Evolution of Lisp (1993) application/pdf
(BIN) Microsoft: Carbon-aware computing: Measuring and reducing the carbon footprint associated with software in execution application/pdf
(BIN) Digitally enhanced brochure for the 1984 Apple Mac 128k computer application/pdf
(BIN) Android 101: prepared for the US Court application/pdf
(BIN) International Standards for Automatic Exchange of Information in Tax Matters: Crypto-Asset Reporting Framework and 2023 update to the Common Reporting Standard application/pdf
(BIN) NCTC Report: Terrorist and Militant Attacks on Electricity Infrastructure Continue at High Rate application/pdf
(BIN) The attack against Danish, critical infrastructure application/pdf
(BIN) The Specops Weak Password Report 2023 application/pdf
-- Reports by CCDH: Center for Countering Digital Hate -
-- a controversial Think Tank. All opinions their own.
(BIN) CCDH: Why platforms must act on twelve leading online anti-vaxxers application/pdf
(BIN) CCDH: How ten fringe publishers fuel 69% of digital climate change denial application/pdf
(BIN) CCDH: TikTok pushes harmful content promoting eating disorders and self-harm into users' feeds application/pdf
(BIN) CCDH: How big tech powers and profits from David Icke's lies and hate, and why it must stop" application/pdf
(BIN) CCDH: How Google profits by cleaning Big Oil's reputation application/pdf
(BIN) CCDH: How Google profits from anti-choice ads distorting searches for reproductive healthcare application/pdf
(BIN) CCDH: How Iran's press TV uses social media to promote anti-Jewish hatred application/pdf
(BIN) CCDH: Submission to the White House Sept 2022 application/pdf
(BIN) CCDH: How Twitter makes millions from anti-LGBTQ+ rhetoric application/pdf
(BIN) CCDH: Report prepared for UK Parliament Public Bill Committee, Online Safety Bill application/pdf
(BIN) Cyber threat report: UK Charity Sector (NCSC) application/pdf
(FILE) Kevin Mitnick's statement to the US Senate: Cyber Attack: Is the Government Safe? text/plain
(BIN) Thoughts on child safety on commodity platforms application/pdf
(BIN) SECURING PRIVACY - Privacy International on End-to-End Encryption application/pdf
(BIN) Draft Indian Telecommunication Bill, 2022 application/pdf
(BIN) Tandy M100 service manual application/pdf
(BIN) Escalation Risks of Intelligence Loss from Countercyber Operations in Crisis application/pdf
(BIN) Soviet Computer Software and Applications in the 1980s application/pdf
(BIN) Australian High Court rules against Google: hyperlinking is not publishing application/pdf
(BIN) Sensitive Court Procedures Following SolarWinds Breach application/pdf
(BIN) The Surreal Case of a C.I.A Hacker's Revenge application/pdf
(BIN) Cyber Intelligence - Danchev Memoir application/pdf
(BIN) Those Unspoken Thoughts: A study of censorship and media freedom in Manipur, India application/pdf
(BIN) A taxonomy of internet shutdowns the technologies behind network interference application/pdf
(BIN) Privacy International's report "Personal data and competition: Mapping perspectives, identifying challenges and enhancing engagement for competition regulators and civil society" application/pdf
(BIN) Extended Analysis of “How Child Welfare Workers Reduce Racial Disparities in Algorithmic Decisions” application/pdf
(BIN) FBI: Ransomware Attacks on Agricultural Cooperatives Potentially Timed to Critical Seasons application/pdf
(BIN) Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure Alert AA22-110A application/pdf
(BIN) Lapsus$, Okta and the Health Sector application/pdf
(FILE) Apple's whitelist of auto-completable domains in iOS (JSON format) text/plain
(FILE) So, you want to be a Darkweb Drug Lord... text/plain
(BIN) The Microft Password Guide application/pdf
(BIN) THE 2022 WEAK PASSWORD REPORT: An annual investigative look at the state of passwords. Specops. application/pdf
(BIN) What Data Do The Google Dialer and Messages Apps On Android Send to Google? application/pdf
(BIN) A Researcher’s Guide to Some Legal Risks of Security Research October 2020 application/pdf
(BIN) St Louis Post-Dispatch publishes report re Missouri Governor Mike Parson's vow to prosecute a journalist for reporting a "security flaw" in a state website application/pdf
(BIN) 2014: Xerox scanners/photocopiers randomly alter numbers in scanned documents (German language) application/pdf
(BIN) This World of Ours: James Mickens, Usenix August 2012 application/pdf
(BIN) Does Transparency in Moderation Really Matter: User Behavior After Content Removal Explanations on Reddit application/pdf
(BIN) 2022/02/03 1408 Coll vs. Google Ruling on disclosure of legal funding arrangements application/pdf
(BIN) Wearing Many Hats: the Rise of the Professional Security Hacker: Goerzen, Coleman application/pdf
(BIN) "The Unix Time-sharing System" the 1978 BSTJ update of the 1974 C. ACM article by Richie and Ken Thompson originally describing Unix application/pdf
(BIN) "The Evolution of the Unix Time-sharing System": an account of developments during 1968-1973 application/pdf
(BIN) "A Stream Input/Output System" from AT&T Bell Laboratories Technical Journal, 1984 application/pdf
(BIN) "Variable-size Arrays in C" a proposal of Richie's that appeared in Journal of C Language Translation, but is not the approach adopted for the 1999 ISO C standard application/pdf
(BIN) "Recent Changes to C": from the 7th Edition manual application/pdf
(BIN) The version of the C Reference Manual that came with 6th Edition Unix (May 1975), in the second volume entitled "Documents for Use With the Unix Time-sharing System" application/pdf
(BIN) "Interprocess Communication in the Ninth Edition Unix System" with D. L. Presotto, from Software-Practice and Experience June 1990 application/pdf
(BIN) OPT/Israel: Six Palestinian human rights defenders hacked with NSO Group’s Pegasus Spyware application/pdf
(BIN) Bugs in our Pockets: The Risks of Client-Side Scanning application/pdf
(BIN) Virtual Worlds, Real People: Human Rights in the Metaverse application/pdf
(BIN) Re: Google Digital Advertising Antitrust Litigation (2nd Complaint) - Jury Trial Demanded application/pdf
(BIN) CENTER FOR THE STUDY OF THE DRONE AT BARD COLLEGE: The Drone Database - March 2020 update application/pdf
(BIN) CENTER FOR THE STUDY OF THE DRONE AT BARD COLLEGE: The Drone Database application/pdf
(BIN) Advisoryreport on the Surveillance Legislation Amendment-IdentifyandDisrupt-Bill 2020.pdf application/pdf
-- Google whistleblower Zach Vorhies walked out 950 pages of Google
internal documents to the Department of Justice anti trust
division detailing Google's extensive censorship project.
This project is called "Machine Learning Fairness", which has
already corrupted Google Search, YouTube and News products.
This, along with various black lists and secret page rank scores
is being used by Google to manipulate public opinion according
to a hidden agenda. Enjoy!
(BIN) AI-with-the-best fairness presentation application/pdf
(BIN) Algorithmic Discrimination from an Environmental Psychology Perspective Stress-Inducing Differential Treatment application/pdf
(BIN) Allegations of Algorithmic Bias Investigation and Meta-Analysis application/pdf
(BIN) Attorney-Client Privileged_ Cloud DEI 2018 Planning application/pdf
(BIN) BUSINESS Multicultural capacity framework - Robbins 2014 - rev. 4-11-17 application/pdf
(BIN) Comms doc Fairness in machine learning application/pdf
(BIN) Deck for participants- 2016-08 Serving Under-Represented Users in Recommenders with Focused Learning application/pdf
(BIN) DeepMind MTV - Introduction to Equality, Diversity and Inclusion - Grow application/pdf
(BIN) Definition of Algorithmic Unfairness - PRIVILEGED application/pdf
(BIN) Expanding Collaboration for News Quality application/pdf
(BIN) Fair is not the default (go fair-not-default) application/pdf
(BIN) Feeding WebSpam manual actions to News (Design Doc) application/pdf
(BIN) Fwd Fake News-letter 11 27 - Efforts to combat spread of (mis/dis)information - Google Groups application/pdf
(BIN) go-ml-fairness application/pdf
(BIN) Metrics and Measurements for Algorithmic Fairness in Machine Learning - Privileged application/pdf
(BIN) ML Fairness application/pdf
(BIN) ML Fairness-resources application/pdf
(BIN) Page level domain restrction 2017_10_02 US Las-Vegas Attack Deadliest Us Mass Shooting Trend Index application/pdf
(BIN) Privileged Confidential - ML Fairness Communication Best Practices application/pdf
(BIN) Realtime Boost - DesignDoc application/pdf
(BIN) RealtimeBoost Events DesignDoc application/pdf
(BIN) Realtime Events - preso application/pdf
(BIN) RMI Diversity Summit - Blaise 15m version (yes really) application/pdf
(BIN) Search - Accelerated Mobile Pages (AMP) - Grow application/pdf
(BIN) Seeds of Change- Root causes of algorithmic unfairness, and a path forward application/pdf
(BIN) Sojourn - people application/pdf
(BIN) The data on diversity - December 1, 2015 application/pdf
(BIN) Training Global Google efforts to address Fake News - 2016 Q4 application/pdf
(BIN) Twiddler Quick Start Guide - Superroot application/pdf
(BIN) Unconscious Bias Cheat Sheet (for Perf) - Google Docs application/pdf
(BIN) Unconscious Bias @ Work (Self Study Video) - Grow application/pdf
(BIN) YouTube controversial query blacklist application/pdf
(URL) Google Leaks: Censorship Exposed: Zach Vorhies' Site (https://www.zachvorhies.com)
-- A fine collection of Technically-oriented PDFs (Papers, Specs,
-- Decks, Manuals, etc) compiled by Trent Nelson and dehain.
-- Visit the full collection at https://github.com/tpn/pdfs
(DIR) The TPN Technical PDF Collection
--
(BIN) United States of America v Joseph James O’Connor Case No.3:21-mj-70812 MAG application/pdf
(BIN) Divsion of local government and school accountability: Watervliet School IT Report application/pdf
(BIN) Divsion of local government and school accountability: Westhill Central School IT Report application/pdf
(BIN) Facebook's Coordinated Inauthentic Behavior Report June 2021 application/pdf
(BIN) John McAfee - died today - Wikipedia as at 2012-06-24 application/pdf
(BIN) APPLICATION FOR SEARCH WARRANT re An0m.pdf application/pdf
(BIN) Pretty Good Phone Privacy: Schmitt, Raghavan application/pdf
(BIN) Privacy Implications of Accelerometer Data: Kröger, Raschke, Bhuiyan application/pdf
(BIN) The Commodore 64 Home Companion application/pdf
(BIN) An Introduction to Ray-Tracing - Morgan Kauffman application/pdf
(BIN) The Hitchhiker’s Guide to Online Anonymity v0.6.6 application/pdf
(BIN) Apple: A Day in the Life of Your Data application/pdf
(BIN) Cease and Desist letter from NPCC to Paul Moore re Cyberalarm software application/pdf
(BIN) Taylor et al. vs Google Case 5:20-cv-07956 application/pdf
(BIN) Prio: Private, Robust, and Scalable Computation of Aggregate Statistics application/pdf
(BIN) International Statement: End-To-End Encryption and Public Safety, OPA, DOJ application/pdf
(BIN) Reform Think Tank-Resilient public services in an age of cyber threats application/pdf
(BIN) Telecom Regulatory Authority of India: Highlights of subscription data 20200731 application/pdf
(BIN) Microsoft Digital Defense Report 2020 September (30Mb) application/pdf
(BIN) Competition document:Unmanned Air Systems in Urban Environments (MOD) application/pdf
(BIN) CISA - Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity application/pdf
(BIN) Multilateral Mutual Assistance & Cooperation Framework for Competition Authorities MOU application/pdf
(BIN) A Guide to the IBM 3033 Processor, AP and MP Complex application/pdf
(BIN) Linux Productivity Tools (Ketan M, Oak Ridge National Laboratory) application/pdf
(BIN) Technical,Legal Review of the Stopp Corona App by the Austrian Red Cross application/pdf
(BIN) Terbium Labs: Data: The Business World's Most Vulnerable Commodity application/pdf
(BIN) Do Cookie Banners Respect my Choice - Matte,Bielova,Santos application/pdf
(BIN) Root DNSSEC KSK Ceremony 403 application/pdf
(BIN) Snowden's Permanent Record - Chinese CN edition with underlined redactions application/pdf
(BIN) Investigation into the Use of Data-analytics in Political Campaigns: final 20181105 application/pdf
(BIN) Description of 1,027,871 images from 50,000unique hotels around the world dataset application/pdf
(BIN) Rollback an apt-get upgrade if something goes wrong on Debian / Ubuntu Linux application/pdf
(BIN) Internet accessible devices; obscenity filtering (State of Arizona) application/pdf
(BIN) Security and Privacy in Computer Systems (Willis H Ware Apri 1967) application/pdf
(BIN) Integrating Artificial Intelligence into Weapon Systems application/pdf
(BIN) Defendent Apple Inc's Motion To Dismiss Plaintiffs' 2nd Amended Complaint (battery/slowdown) application/pdf
(BIN) The Cyber Security Body Of Knowledge v1.0 application/pdf
(BIN) Google Report: The Hunt for 3ve application/pdf
(BIN) Ofcom: UK Communications Market Report 2018 application/pdf
(BIN) Robust Website Fingerprinting Through the Cache Occupancy Channel application/pdf
(BIN) UK’s Critical National Infrastructure Third Report of Session 2017–19 application/pdf
(BIN) ATM logic attacks: scenarios application/pdf
(BIN) Audit of the acute kidney injury detection system known as Streams Royal Free London NHS Foundation Trust application/pdf
(BIN) Apple T2 Security Chip Security Overview October 2018 application/pdf
(BIN) Consultation on revised assessment arrangements for GCSE computer science application/pdf
(BIN) After the Reboot - Computing Education in UK Schools application/pdf
(BIN) Self-encrypting deception: weaknesses in the encryption of solid state drives application/pdf
(BIN) The Case for the Web - a proposed charter for Netizens application/pdf
(BIN) Taamneh vs Twitter application/pdf
(BIN) China Telecom's BGP Hijacking application/pdf
(BIN) Code of Practice for Consumer IoT Security Oct 2018 application/pdf
(BIN) onsumer_Guidance_for_Smart_Devices_in_the_Home_Oct_2018 application/pdf
(BIN) Mapping of IoT: Security Recommendations,Guidance,Standards Oct 2018 application/pdf
(BIN) Insight Intelligent Technology Index 2018 application/pdf
(BIN) The Stroz Report application/pdf
(BIN) Google vs Levandowski: engineer went to Uber application/pdf
(BIN) Accelerating Wireline Broadband Deployment by Removing Barriers to Infrastructure Investment application/pdf
(BIN) City_of_Philadelphia_Comments_to_Draft application/pdf
(BIN) FCC FACILITATES DEPLOYMENT OF WIRELESS INFRASTRUCTURE FOR 5G CONNECTIVITY application/pdf
(BIN) Migrating an old Mac Mini work environment to a Raspberry Pi application/pdf
(BIN) Yet Another Wireless Access Project (YARWAP): Billy Nomad application/pdf
(BIN) Machine Learning Algorithms and Police Decision-Making: Legal, Ethical and Regulatory Challenges application/pdf
(BIN) OpenEMR v5.0.1.3 - Vulnerability Report - Project Insecurity - insecurity.sh application/pdf
(BIN) The MSB 2018 Virus Situation as of 3oth July 2018 by Eric Wyatt application/pdf
(BIN) Open Rights Group: Age Verification Briefing 08/2018 application/pdf
(BIN) Under The Hoodie - pentesting 2018 report application/pdf
(BIN) Teach 'em to Phish - Privacy International report application/pdf
(BIN) Are your cookies telling your fortune: analysis of weak cookie secrets and OSINT application/pdf
(BIN) Stuxnet: (how to) kill a centrifuge application/pdf
(BIN) The AWK Programming Language (1988) application/pdf
Related to British Board of Film Censors (BBFC) in their role as
Managers of the UK Government Age Verification System for adult
websites.
(BIN) BBFC: Draft Guidance on Age-verification Arrangements and Draft Guidance on Ancillary Service Providers application/pdf
(BIN) BBFC: UPDATED Draft Guidance On Age Verification Arrangements, Draft Guidance On Ancillary Service Providers application/pdf
(BIN) BBFC: Guidance on Age-verification Arrangements Submitted to the Secretary of State pursuant to section 25 of the Digital Economy Act 2017 application/pdf
(BIN) BBFC: Memorandum of understanding between the ICO and BBFC application/pdf
(BIN) BBFC: Memorandum of understanding between the IWF and BBFC application/pdf
Speakers notes from the Defcon 25 conference in Las Vegas
(BIN) DEFCON 25: 0ctane Untrustworthy Hardware application/pdf
(BIN) DEFCON 25: Alvaro Munoz JSON attacks application/pdf
(BIN) DEFCON 25: Andrew Robbins and Will Schroeder An Ace Up The Sleeve application/pdf
(BIN) DEFCON 25: Artem Kondratenko Cisco Catalyst Exploitation application/pdf
(BIN) DEFCON 25: Ayoul3 Dealing the Perfect Hand Shuffling memory blocks on zOS application/pdf
(BIN) DEFCON 25: Caleb Madrigal IOT Hacking With SDR application/pdf
(BIN) DEFCON 25: Chris Thompson MS Just Gave The Blue Teams Tactical Nukes application/pdf
(BIN) DEFCON 25: Christopher Domas Breaking The x86 ISA application/pdf
(BIN) DEFCON 25: Cincvolflt Inside The Meet Desai Attack application/pdf
(BIN) DEFCON 25: Damien Cauquil Weaponizing the BBC MicroBit application/pdf
(BIN) DEFCON 25: Daniel Bohannon and Lee Holmes Revoke Obfuscation application/pdf
(BIN) DEFCON 25: Datko and Quartier Breaking Bitcoin Hardware Wallets application/pdf
(BIN) DEFCON 25: Dhia Mahjoub and Thomas Mathew Malicious CDNs Identifying Zbot Domains en Masse application/pdf
(BIN) DEFCON 25: Foofus Secret Tools Learning About Gov Surveillance Software application/pdf
(BIN) DEFCON 25: Gabriel Ryan Advanced Wireless Attacks Against Enterprise Networks Course Guide application/pdf
(BIN) DEFCON 25: Gabriel Ryan Advanced Wireless Attacks Against Enterprise Networks Lab Setup Guide application/pdf
(BIN) DEFCON 25: Gabriel Ryan Advanced Wireless Attacks Against Enterprise Networks application/pdf
(BIN) DEFCON 25: Gerald Steere and Sean Metcalf Hacking the Cloud application/pdf
(BIN) DEFCON 25: Gil Cohen Call The Plumber You Have A Leak In Your (named) Pipe application/pdf
(BIN) DEFCON 25: Hanno Boeck Abusing Certificate Transparency Logs application/pdf
(BIN) DEFCON 25: Haoqi Shan and Jian Yuan Man in the NFC application/pdf
(BIN) DEFCON 25: Hernandez Richards MacDonald Evoy Tracking Spies in the Skies application/pdf
(BIN) DEFCON 25: Hyrum Anderson Evading Next Gen AV Using AI application/pdf
(BIN) DEFCON 25: Ilja van Sprundel BSD Kern Vulns application/pdf
(BIN) DEFCON 25: Inbar and Eden Story of Early Israeli Hacking Community application/pdf
(BIN) DEFCON 25: Jesse Michael and Mickey Shkatov Driving Down the Rabbit Hole application/pdf
(BIN) Baloch: Bypassing Browser Security Policies For Fun And Profit application/pdf
(BIN) The State of Surveillance in 2018 - BigBrotherWatch application/pdf
(BIN) ICANN: WHOIS, GDPR Article 29 working party memo application/pdf
(BIN) ICANN: Proposed temporary spec of gTLD registration data application/pdf
(FILE) Phrack Magazine: Attacking JavaScript Engines text/plain
(BIN) Julian Assange's statement November 14/15th 2016 application/pdf
(BIN) ONS Report: Internet Access Households & Individuals 2016 application/pdf
(BIN) Information Security for Journalists v1.3 application/pdf
(FILE) BBS Lists: Os/2 BBS text/plain
(BIN) "What would you like to see to see most in Minix?" A question by some guy called Torvalds application/pdf
(BIN) D1 COMMSEC - Elisabeth de Leeuw - Unformation in the Era of Hyper Connectivity application/pdf
(BIN) D1 COMMSEC - Marc Newlin - Applying Regulatory Data to IoT RF Reverse Engineering application/pdf
(BIN) D1 COMMSEC - Martin Knobloch - Dont Feed the Hippos application/pdf
(BIN) D1 COMMSEC - Nadav Markus and Gal De Leon - Exploiting GLIBC - Hacking Everything application/pdf
(BIN) D2 COMMSEC - Mattijs van Ommeren - A Series Of Unfortunate Events - Where Malware Meets Murphy application/pdf
(BIN) D1T1 - Jacob Torrey - Using the Observer Effect and Cyber Fengshui application/pdf
(BIN) D1T1 - Lin Huang - Forcing a Targeted LTE Cellphone into an Eavesdropping Network application/pdf
(BIN) D1T1 - Nick Biasini - Exploit Kits - Hunting the Hunters application/pdf
(BIN) D1T1 - Radu Caragea - Peering into the Depths of TLS Traffic in Real Time application/pdf
(BIN) D1T1 - Shengping Wang and Xu Liu - Escape From The Docker-KVM-QEMU Machine application/pdf
(BIN) D1T1 - Tang Qing Hao - Virtualization System Vulnerability Discovery Framework application/pdf
(BIN) D1T2 - Broderick Aquilino and Wayne Low - Kernel Exploit Hunting and Mitigation application/pdf
(BIN) D1T2 - Chilik Tamir - Profiting from iOS Malware application/pdf
(BIN) D1T2 - Michele Spagnuolo and Lukas Weichselbaum - CSP Oddities application/pdf
(BIN) D1T2 - Tim Xia - Adaptive Android Kernel Live Patching application/pdf
(BIN) D1T2 - Yann Allain and Julien Moinard - Hardsploit Project application/pdf
(BIN) D1T3 - Gustavo Grieco - Vulnerability Discovery Using Machine Learning application/pdf
(BIN) D1T3 LABS - Anto Joseph - Droid-FF application/pdf
(BIN) D2T1 - Anders Fogh - Cache Side Channel Attacks application/pdf
(BIN) D2T1 - Felix Wilhelm - Attacking Next Generation Firewalls application/pdf
(BIN) D2T1 - Jun Li - CANSsee - An Automobile Intrusion Detection System application/pdf
(BIN) D2T1 - Yuwei Zheng and Haoqi Shan - Forging a Wireless Time Signal to Attack NTP Servers application/pdf
(BIN) D2T1 Itzik Kotler and Amit Klein - The Perfect Exfiltration Technique application/pdf
(BIN) D2T2 - Mikhail Egorov and Sergey Soldatov - New Methods for Exploiting ORM Injections in Java Applications application/pdf
(BIN) D2T2 - Peter blasty Geissler - Breaking Naive ESSID WPA2 Key Generation Algorithms application/pdf
(BIN) D2T2 - Richard Johnson - Go Speed Tracer - Guided Fuzzing application/pdf
(BIN) D2T2 - Shangcong Luan - Xen Hypervisor VM Escape application/pdf
(BIN) D2T2 - Wish Wu - Perf - From Profiling to Kernel Exploiting application/pdf
(BIN) D2T3 LABS - Matteo Beccaro - Electronic Access Control Security application/pdf
(BIN) KEYNOTE 1 - John Adams - Beyond FBI v Apple application/pdf
(BIN) KEYNOTE 2 - Adam Laurie - The Future Has Arrived and its Effin Hilarious application/vnd.oasis.opendocument.presentation
(BIN) The rise and fall of the Gopher protocol-MinnPost application/pdf
(BIN) CLOSING KEYNOTE - Sophia D Antoine - Hardware Side Channels in Virtualized Environments application/pdf
(BIN) Assange: "Google is not what it seems" application/pdf
(BIN) Do You See What I see? Differential of Anonymous Users application/pdf
(FILE) The Dutch Government Position on Encryption [original Dutch].txt text/plain
(FILE) The Dutch Government Position on Encryption [machine_translated].txt text/plain
(BIN) Don't throw away your old_boarding pass application/pdf
(BIN) Government Cellphone Surveillance Equipment Catalogue application/pdf
(FILE) Kazakhstan Telecom notifies on introduction of national security certificate from January 2016 text/plain
(BIN) Perl 6 Introduction application/pdf
(BIN) Megaupload: the Copyright Lobby and the Future of Digital Rights application/pdf
(BIN) Megaupload: Affidavit of Lawrence Lessig September 2015 application/pdf
(BIN) Covert Communication in Mobile Applications 2015 application/pdf
(BIN) NSA Journal of Information Warfare 2015 application/pdf
(BIN) NSA Journal of Information Warfare 2014 application/pdf
(BIN) EFF Report on colour printers that watermark each doc printed application/pdf
(BIN) Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice application/pdf
(BIN) TOR browser forensics on Windows OS (short).pdf application/pdf
(BIN) Microsoft: a History of Anticompetitive Behaviour and Consumer Harm (2009) application/pdf
(BIN) The Web's Shadiest (TLD) Neighbourhoods application/pdf
(BIN) Wifi Bedouin - Julian Bleecker's project that spawned the PirateBox application/pdf
(BIN) Location Tracking using Mobile Device Power Analysis application/pdf
(BIN) Equation Group: questions and answers. Report by Kaspersky application/pdf
(BIN) SOHO Pharming: a Team Cymru report on the scale of home/SOHO router exploits application/pdf
(BIN) Draft Declaration of Internet Rghts application/pdf
(BIN) "Chattering Laptops" - think you're anonymous? Er, no application/pdf
(BIN) The (real) Matrix - via The Hidden Wiki application/pdf
(BIN) A Question of Momentum - Critical Reflections on Individual Options for Surveillance Resistance.pdf application/pdf
(BIN) Understanding Counter-surveillance as Critical Discourse and Practice.pdf application/pdf
(BIN) POST note discussing the state of UK data encryption in 2006 application/pdf
(BIN) POST note discussing Tor, the Dark Net and Online Anonymity application/pdf
(BIN) 142,635,139 emails inspected by Mimecast; report application/pdf
(BIN) Western Australian Auditor General’s Report: IT systems 2018 application/pdf
(DOS) A collection of *nix Sysadmin Test Questions and Answers for Interview/Exam (2018 Edition) application/zip
(DOS) PHP 4.0 documentation as big html application/octet-stream
(BIN) A framework for progressive engagement of staff in cyber security application/pdf
(BIN) Why Johnny Can’t Encrypt-Usability Evaluation of PGP 5.0 application/pdf
(BIN) Why Johnny -Still- Can’t Encrypt Evaluating the Usability of a Modern PGP_Client application/pdf
(DIR) Bitreich.org Gopherish-themed radio interview (bitreich.org)
(BIN) Google Data Collection: Professor Douglas C Schmidt Professor of Computer Science Vanderbilt University application/pdf
(IMG) The Linux distro family tree image/png
(FILE) How Perl Saved the Human Genome Project.txt text/plain
(BIN) Understanding and Characterizing Interception of the DNS Resolution Path application/pdf
(BIN) Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures application/pdf
(BIN) Freeing the Web from the Browser: Revisiting Open Hypermedia (Savage, J: Univeristy of Bath) application/pdf
(BIN) A Two-Phase Usability Study of the FIDO U2F Security Key application/pdf
(BIN) Do a robot’s social skills and its objection discourage it being switched off (Horstmann et al) application/pdf
(BIN) Easy-read guide to LED safety application/pdf
(BIN) Potential Human Health Risks of LEDs - Sheer, Final application/pdf
(BIN) Results of public consultation on Scheer's preliminary opinion on LEDs application/pdf
(BIN) ERP Applications Under Fire - Onapsis - July 2018 application/pdf
(BIN) FTC Consumer Sentinel Data Book 2017 - Fraud, Theft Report application/pdf
(BIN) The 8 Fallacies of Distributed Computing application/pdf
(BIN) DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning application/pdf
(BIN) Forensic Analysis and Anonymisation of Printed Documents application/pdf
(BIN) Identification and Obfuscation of Social Media Users using metadata application/pdf
(BIN) The Commodore 64 design from 1985 application/pdf
(BIN) Deceived by design: User Interface Dark Patterns (Google, Facebook) application/pdf
(BIN) Inference Attacks by Malicious Batteries on Mobile Devices application/pdf
(BIN) Experimental Security Assessment of BMW Cars by KeenLab (summary).pdf application/pdf
(BIN) Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels (draft 0.9.0) application/pdf
(BIN) A PDF containing an overview and alphabetical listing of Windows commands application/pdf
(BIN) Center for Internet Security Benchmark: Debian 1.0 2007 application/pdf
(BIN) BBC:Microbit A quick-start guide for Teachers application/pdf
(BIN) State Considered Harmful: a proposal for a stateless laptop - Rutkowska application/pdf
(BIN) Intel X86 Considered Harmful - Rutkowska application/pdf
Dennis Yurichev's incredible guide to Reverse-Engineering
(BIN) Reverse Engineering for Beginners: full version, A4 size application/pdf
(BIN) Reverse Engineering for Beginners: lite version, A4 size application/pdf
(BIN) Reverse Engineering for Beginners: full version, A5 (ebook) size application/pdf
(BIN) Reverse Engineering for Beginners: lite version, A5 (ebook) size application/pdf
(BIN) SSH Mastery: OpenSSH, PUTTY, Tunnels and Keys by Michael W Lucas application/pdf
(BIN) Using malware for money? Read this "study on incentivizing users to ignore security advice application/pdf
(FILE) Linux ate my RAM!! Er, not really.. text/plain
(BIN) NSA Converged Analysis of Smartphone Devices (May 2010) application/pdf
(BIN) Purpose of the Best1_User account created by the BMC Performance Assurance installation application/pdf
(BIN) Spoiled Onions: Exposing Malicious Tor Exit Relays application/pdf
(FILE) Raspberry Pi verified peripherals Jan 2014 text/plain
(FILE) The essential GPG crib sheet text/plain
(FILE) A Howto guide for Linux and Open Source software text/plain
(BIN) Linux essentials: the complete introduction application/pdf
(BIN) User Guide for the original Mac Mini PPC application/pdf
(BIN) UK Crypto Laws 2013 application/pdf
(BIN) What hard drive should I buy - via Backblaze blog application/pdf
(BIN) The original Billy Nomad Project notes from 2004 application/pdf
(URL) Uniform Resource Identifier (URI) Schemes (http://www.iana.org) application/xhtml+xml
(URL) Meulie.net Gopher Proxy Statistics (we're in there!) (http://gopherproxy.meulie.net)
Proxy List
(FILE) Full list of free, public, forward proxy servers (updated daily) text/plain
(FILE) List of free, public, forward proxy servers (updated daily) JUST THE IP+PORT text/plain
IETF RFCs
(FILE) Citations for all RFCs in numeric order (updated daily) text/plain
(FILE) RFC1436 - The Internet Gopher Protocol text/plain
(FILE) RFC2378 - The CCSO Nameserver (Ph) Architecture text/plain
(FILE) RFC4266 - The Gopher URI scheme text/plain
UPDATED OFTEN
(FILE) Ages of MAC addresses scraped from the web (CSV) text/csv
Response: application/gopher-menu
Original URLgopher://gopher.petergarner.net/1/Cybertech/
Content-Typeapplication/gopher-menu; charset=utf-8