• Weekly Privacy Roundup #8

    ”Privacy is dead, and social media hold the smoking gun.” – Pete Cashmore. Face masks prompt London police to consider pause in rollout of facial recognition cameras The rollout of facial recognition cameras in London is facing disruption as citizens are… read more »
  • Don't forget to bring a towel!

    For my birthday, I got myself a present: I carved out enough time to finalize a musical project deferred too many times. The project is named "Don't forget to bring a towel" and is (guess what?) a "concept album" dedicated… read more »
  • How to install WSL on Windows 10 Enterprise LTSC

    It's no secret that my favorite OS is Debian, however, if for various reasons (often Hardware/Software compatibility) i need to install a Windows, i prefer the LTSC version. LTSC is a specialized edition of Windows 10 Enterprise that provides the… read more »
  • Weekly Cybersecurity Roundup #8

    "I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We’ve created life in our own image." - Stephen Hawking… read more »
  • Quick mount of iOS Apps documents on Linux, using iFuse and bash

    A very good feature of GNOME is the automatic mount of app's document sharing when an iOs device is connected to the system. On my i3 setup the user experience is more basic, but still useful. First, resolve some dependencies:… read more »
  • Weekly Tech Roundup #7

    “It's still magic even if you know how it's done.” ― Terry Pratchett Apple battles Ableton Live with new Logic Pro X 10.5 features Today, Apple announced Logic Pro X 10.5, a major update to its popular digital audio workstation (DAW) for… read more »
  • Windows 10 packet monitor tool "pktmon" will allow real-time monitoring

    Since October 2018 Update, Windows 10 comes with a "Packet Monitor" tool called pktmon.exe.With the upcoming release of the Windows 10 May 2020 Update, Microsoft will update the pktmon tool to allow real-time visualization of monitored packets. How to use… read more »
  • Weekly Privacy Roundup #7

    “There's something really liberating about having some corner of your life that's yours, that no one gets to see except you. It's a little like nudity or taking a dump. Everyone gets naked every once in a while. Everyone has… read more »
  • curl: my own cheatsheet

    curl is a project providing a library and command-line tool for transferring data using various protocols.The command line tool can be used inside shell scripts with ease and it has around 120 command line options for various tasks. Is a… read more »
  • Weekly Cybersecurity Roundup #7

    "Amateurs hack systems, professionals hack people" - Bruce Schneier Zoom to add end-to-end encryption with Keybase acquisition Zoom has acquired secure messaging and identity management firm Keybase as its looks to shore up security capabilities on its platform with end-to-end… read more »
  • Thunderspy: a Thunderbolt security flaw that affects all systems released before 2019

    Björn Ruytenberg, a researcher of Eindhoven University of Technology, published a research about a new vulnerability in Thunderbolt ports. The new attack, named "Thunderspy" [1], is designed to break Thunderbolt's security, making it possible for attackers to steal information from… read more »
  • Weekly Tech Roundup #6

    "Computers are useless. They can only give you answers" - Pablo Picasso NASA still doesn’t know how long SpaceX’s astronaut mission will last We’re fast approaching crunch time for the partnership between NASA and SpaceX that will culminate in the… read more »
  • “Psychic Paper”: an amazingly simple iOS sandbox escape exploit

    Security researcher Siguza published a really interesting paper about a strange bug in iOS XML parsers, still unpatched, that allows sandbox escape. In his article [1], Siguza explains how to allow an app to gain full access to the entire… read more »
  • Some thoughts about detectability and feasibility of mobile eavesdropping on smartphones

    A research presented in 2019 by Jacob Leon Kröger and Philip Raschke, during the 33rd Annual IFIP WG 11.3 Conference, analyze technical and economical feasibility of eavesdropping on modern smartphones. The study’s findings [1] suggest that eavesdropping activity would not… read more »
  • Weekly Privacy Roundup #6

    "If someone steals your password, you can change it. But if someone steals your thumbprint, you can’t get a new thumb. The failure modes are very different." – Bruce Schneier  Is the GDPR failing? If it is, how can it… read more »
  • Practical approach to Golden Ticket Attacks: one technique, five useful tools

    In the past, I've already written about Kerberos attacks, especially on Ticket Attacks. In all examples, I've always used only Mimikatz, because i think is the most know tool used for this kind of attacks. However, some days ago, I… read more »
  • Weekly Cybersecurity Roundup #6

    "Being able to break security doesn't make you a hacker anymore than being able to hotwire cars makes you an automotive engineer." - Eric Raymond Hackers say they stole millions of credit cards from Banco BCR Hackers claim to have… read more »
  • Weekly Tech Roundup #5

    "The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. The second is that automation applied to an inefficient operation will magnify the inefficiency." - Bill Gates Coronavirus… read more »
  • iOS forensic acquisition methods

    Vladimir Katalov published, on ElcomSoft's blog, a good post about forensic acquisition techniques for iOS devices. It's a really interesting paper, from which I'd like to share some highlights: Logical acquisition Logical acquisition is the fastest, simplest, and most compatible… read more »
  • Weekly Privacy Roundup #5

    "What does censorship reveal? It reveals fear" - Julian Assange Nintendo says 160,000 users impacted in recent account hacks Japanese gaming company Nintendo confirmed today that hackers gained unauthorized access to around 160,000 user accounts since the start of the… read more »