[ / / / / / / / / / / / / / ] [ dir / agatha2 / ausneets / b2 / builders / choroy / dempart / vg / vichan ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): 12c9e2d9254fe74⋯.jpeg (367.99 KB, 800x622, 400:311, picture01.jpeg) (h) (u)

[–]

 No.1069958[Watch Thread][Show All Posts]

I created this thread to clear away the smoke and mirrors associated with "security" and to dispel misconceptions about it.

ITT we shall discuss the nitty gritty of security and clarify just what it means to be secure.

The flavor of discussion I would like would be:

>situations in which security could become cracked

>setting up secure systems/stations

>tools used for security

>good practices to ensure security both online and off

>red team vs blue team??

>???

Security cracking discussion is also welcome (ie exploits in various softwares)

I am aware that security and anonymity are not the same, but they certainly do go hand in hand. Security in this sense is preventing unauthorized access to your device and preventing data exfil. This of course is crucial for anonymity as being insecure is a surefire way to become de-anonymized.

 No.1070011>>1070100

PoC||GTFO


 No.1070021

Post your zeroday MD5 brute force hash cracker


 No.1070100

>>1070011

But am not an nigger though???


 No.1070165

The weakest point is people, so you'll probably want to get rid of them.


 No.1070174

hekker telnet




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
5 replies | 0 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / agatha2 / ausneets / b2 / builders / choroy / dempart / vg / vichan ][ watchlist ]