Tag Archive

DeepSec and Tor Tickets – Update

Published on August 24, 2018 By René Pfeiffer

We wrote about the German Tor operator relay organisation Zwiebelfreunde e.V. a while ago. They were raided on 20 June 2018 by the German police in five different locations. The police was investigating a German left-wing blog and was trying to find the author of articles published there. As many of you know, Tor exit […]

Mythbusting: Anti-Virus Research considered dangerous

Published on August 18, 2017 By sanna

Everyone doing research in information security or doing any work in this field takes some risks. Since most of the „cyber stuff“ is black magic to others not working in this context, there are a lot of problems and severe misunderstandings. The Crypto Wars still haven’t been decided in favour of mathematics. Real people prefer […]

DeepSec Video: Legal Responses Against Cyber Incidents

Published on February 16, 2016 By René Pfeiffer

Despite current efforts to adapt existing legal instruments to regulate hostile activities in cyber space, there is uncertainty about the legal situation of actors affected by these actions. Part of this uncertainty is due to the fact that the cyber domain is technically complex; there is a strong need for collaboration between technical and legal […]

DeepSec Video: A Death in Athens – The inherent Vulnerability of “Lawful Intercept” Programs

Published on January 20, 2016 By René Pfeiffer

In politics it is en vogue to create new words by connecting them. The words „cyber“ and „lawful“ come to mind. You can add „crime“ and „intercept(ion)“, and then you got something. Actually you can combine both of the latter words with the first two. Either combination makes sense if you take a look at […]

Endangered Species: Full Disclosure in Information Security

Published on November 6, 2015 By sanna

History, fictive or real, is full of situations where doubts meet claims. Nearly every invention, every product will be eyed critically, analysed, and tested. There are even whole magazines fully dedicated to this sport, be it for example, consumer protection, reviews of computer games or the car of the year. When it comes to testing […]

DeepSec 2015 Talk: Legal Responses Against Cyber Incidents – Oscar Serrano

Published on September 19, 2015 By sanna

Like it or not, „cyber“ is here to stay. No matter what word you use, the networks have become a battlefield for various military operations. While you won’t be able to secure physical territory by keyboard (you still need boots on the ground for this), you can gain information, thwart hostile communications, and possibly sabotage […]

What is a Hacker Tool and how do you ban it?

Published on April 25, 2012 By René Pfeiffer

What exactly is a hacker tool? The answer to this question depends on who you ask. To McGyver it would probably everything, to a hacker it would be any suitable tool and to a politician it would be anything that cannot be easily understood. The English Wikipedia has no entry on hacker tool. So what […]

DeepSec.net is on Strike!

Published on January 18, 2012 By René Pfeiffer

You have probably heard of the Stop Online Piracy Act (SOPA) and its chilling effects on the Internet and all its users. „The originally proposed bill would allow the U.S. Department of Justice, as well as copyright holders,to seek court orders against websites accused of enabling or facilitating copyright infringement. “ (quote taken from the […]

Talk: Laws, Compliance and real Life

Published on November 3, 2011 By René Pfeiffer

If you believe that computer security is all about having the right tools and an expert staff, then you are mistaken. Never forget why you have computers in the first place – because of your business. Mikhail Utin will shed light on the corporate side of security by talking about  laws, compliance and real life […]

Lessons in Trust and Malicious Code from the Staatstrojaner

Published on October 31, 2011 By René Pfeiffer

Since it is Halloween we will beat an undead horse in our blog today. Zombies are all the fashion both in literature and on your computer. The question is: Are all zombies alike? Are there good and bad zombies, or only bad ones? How can you distinguish between good and evil intentions if all you […]

Dissection of Malware and Legality

Published on October 24, 2011 By René Pfeiffer

You have probably seen the articles about the 0zapftis (a.k.a. the German Federal Trojan) malware used by the German police for investigation. There’s a lot going on in Germany and the German parliament, so we’d like to point out the issue of dissecting governmental malware and its relation to common sense and the law. The […]

Talk: How Terrorists Encrypt

Published on August 31, 2011 By René Pfeiffer

Encryption technology has always been regarded as a weapon, due to its uses in wars and espionage. Software used for encryption was banned for export to other countries in the US. The export regulations for strong cryptography were relaxed in 1996. Some countries still consider cryptographic software as a threat. Recently there have been discussions […]