Having a philosophical moment thinking about my own privacy, I took a trip back through the history of the concept “privacy” by following the simple question: “Do you have privacy?”
Oct
Having a philosophical moment thinking about my own privacy, I took a trip back through the history of the concept “privacy” by following the simple question: “Do you have privacy?”
Sep
So, you’ve heard about the Telegram fiasco, right? The big guy in charge got thrown in the slammer in France, and everyone started panicking about who’s really in control of our messages. If that doesn’t scream, “Hey, maybe don’t trust centralized platforms,” then I don’t know what will. But don’t worry! This guide is here […]
Feb
Exploring the evolution of computer viruses from the 1970s to present times, where I discuss the continuous battle between ever-evolving cyber threats and advancing cybersecurity. From pioneering malware like Creeper and Brain to the widespread destruction caused by I Love You and SQL Slammer, each era demonstrates escalating sophistication and societal impact, emphasizing the need for proactive security measures, education, and global collaboration to combat and adapt to these persistent cyber threats.
May
Can you write a self-replicating virus in python? I gave it a try.
Jan
I made a Proof of Concept exploit (two actually) for the new Polkit CVE posted yesterday. Find a description and code here.
Jun
Have you ever shared a picture of your Danish social security card (in Danish: sundhedskortet) online? Maybe with a finger across to cover the secret number?
Think you’re safe from identify theft? probably not!
Aug
If you want to have extra security for your linux machine besides the usual password. Then get yourself a SoloKey or other hardware U2F key and use that as secondary login. Here I give you the description on how to install and configure everything for using Solokeys with your linux. Enjoy!