Archive for January, 2019

Translated Article: Campaign of the Spy Alliance “Five Eyes” against WhatsApp and Co

January 8, 2019

Feldzug der Spionageallianz „Five Eyes“ gegen WhatsApp und Co for fm4 by Erich Moechel The current scattered news and reports on “encryption” belong together. The military secret services of the “Five Eyes” conduct a global campaign; in Australia they’ve already reached their first milestone. Every two years, around the same time, a campaign of the espionage […]

Tags: , , , , , , , ,
Posted in Discussion, High Entropy, Security Comments Off on Translated Article: Campaign of the Spy Alliance “Five Eyes” against WhatsApp and Co

ROOTS 2018: Library and Function Identification by Optimized Pattern Matching on Compressed Databases – Maximilian von Tschirschnitz

January 7, 2019

[Editor’s note: This article belongs to the Reversing and Offensive-oriented Trends Symposium 2018 (ROOTS). It was misplaced, so we publish it today. Maximilian’s talk was recorded and can be watched on Vimeo.] The goal of library and function identification is to find the original library and function to a given machine-code snippet. These snippets commonly […]

Tags: , , ,
Posted in ROOTS Comments Off on ROOTS 2018: Library and Function Identification by Optimized Pattern Matching on Compressed Databases – Maximilian von Tschirschnitz

Analysing Data Leaks and avoiding early Attribution

January 4, 2019

The new year starts with the same old issues we are dealing with for years. German politicians, journalists, and other prominent figures were (are) affected by a data leak. A Twitter account started tweeting bits from the leaked data on 1 December 2018 in the fashion of an Advent calendar. The account was closed today. […]

Tags: ,
Posted in High Entropy Comments Off on Analysing Data Leaks and avoiding early Attribution