recentpopularlog in


« earlier   
Home  |
With actionable guidance and analysis, helps developers like you learn and apply the web's modern capabilities to your own sites and apps.
google  performance  testing  webdev  security 
10 minutes ago by keimlink
Private by Design: How we built Firefox Sync - Mozilla Hacks - the Web developer blog
Detailed look at how they create auth tokens to use rather than sending passwords
encryption  privacy  security  howto  algorithm 
50 minutes ago by amcewen
Identity Leak Checker
Prüfen ob Zugangsdaten geklaut wurden
security  tool  password  zugangsdaten 
1 hour ago by weberknechtbiz
FDA isn't doing enough to prevent medical device hacking, HHS report says - CNN
The inspector general's office identified cybersecurity in medical devices as one of the top management problems for Health and Human Services.
fda  security 
2 hours ago by ssorc
"Hemlig avlyssning och masstopsning - det är tydligt att polisen tänjer på lagens gränser"
Det är tydligt att polisen tänjer på gränserna. Hemlig telefonavlyssning beslutas av tingsrätt efter en framställan från åklagare. För att kunna bevilja tillstånd krävs att andra åtgärder är otillräckliga, att man inte kommer längre i ärendet och att minimistraffet är två års fängelse.
Det finns dock i RB 27:18 en "slaskparagraf" som medger att polisen tänjer på gränserna om man tillsammans med förundersökningsledaren lyckas komma fram till att brottet har ett straffvärde överstigande två års fängelse.
Detta undantag har jag - trots 46 år i polismyndighet - aldrig varit med om att använda. Kanske har det tillkommit senare...
Sweden  Swedish  crime  security 
2 hours ago by seatrout
Hacking an expo... what's the worst that could happen? -
What happened when we hacked an expo?’s an interesting vector for XSS and goes to show that you really need to sanitise data before doing anything with it regardless of the source...imagine if the flaw existed on an app used by thousands, or downloaded by millions? All that data would be up for grabs for malicious actors...details obtained could then be used for widespread phishing campaigns or brute-force attacks.
security  hacking  xss 
3 hours ago by tiredoldfellow
How to build your own cryptocurrency wallet with Raspberry Pi
To put this contraption together, the developer used a Raspberry Pi 3, a 3.5-inch RPi display, and an SD card. Once he had all these parts, Rusnak loaded the device with Raspbian – an operating system for Raspberry Pi boards – and installed the Trezor Emulator.
blockchain  trezor  bitcoin  wallet  Security  raspberry-pi 
4 hours ago by activescott
[1705.07386] DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution
Using GAN's to make a master/skeleton key equivalent fingerprint to match ALL THE PEOPLE. This will not end well. Plus the principles are probably applicable to any other biometric authentication, perhaps including DNA that is not full sequenced...
biometric  security  research  deep  machine  learning  GAN  masterkey  skeletonkey  master  fingerprint 
6 hours ago by asteroza

Copy this bookmark:

to read