Last week I watched a presentation about the new European directive about Network and Information Security 2 (NIS2). The essence of this presentation was that current regulations are still not sufficient enough to make companies resilient against cyber security threats. The current trend is that cyber security criminals (e.g.
Around two years ago, I checked out the pluggable transports system of Tor. This mechanism can be used to circumvent network censoring done by network administrators / authoritarian governments which deny their citizens to certains parts of the internet. In most censoring situations there will be a blacklist of website, e.
Publish date: 28-Feb-2016 Prior knowledge required: Technical understanding of Tor Article in PDF Format: https://maikel.pro/published/progress-tor-pluggable-transports.pdf Direct link to article in PDF format. 1. Internet Censorship Internet Censorship comes in many forms: black listing websites, whitelisting websites, physically shutting it down, denying access based on status
Publish date: 15-Jan-2016 Prior knowledge required: Abstract understanding of PKI. Article in PDF Format: https://maikel.pro/published/crls-ocsp-stapling.pdf Direct link to article in PDF format. OCSP and its PKI aspects Public Key Infrastructure is crucial in today’s use of the internet. PKI is a infrastructure with the
Introduction to WhatsSpy Public (not to confuse with WhatsSpy)? | WhatsSpy Public Project page I released a tool this Saturday, which will give you some insight of what a “hacker” (or in fact any stranger with some programming knowledge) can conclude of your WhatsApp behavior. This tool visualizes the following properties
So there is this menu called "privacy" in WhatsApp. Here you can edit your "last seen", "profile picture" and "status" privacy options. You may think now that you've set all options to "nobody" you are privacy-wise safe. But nevertheless I can still track your moves on Whatsapp. WhatsSpy Public WhatsSpy
MEME staat voor Minimum Effort, Maximum Efficiency. Dit ontwikkelmodel gaat uit van de volgende principes: * Het opleveren van een product met zo weinig mogelijk functionaliteiten en kwaliteiten in een zo kort mogelijke tijdsperiode. * Het ontwijken van de echte benodigheden van de klant om extra kosten aan de kant van de