Photos
Posts

Earned it..

Deleted code written after 2 am in the morning in last 10 days. The code desperately needs sleep.

Posts

DANE - RFC 7929 https://t.co/XbjF4vNjzH

Internet Engineering Task Force (IETF) P. Wouters Request for Comments: 7929 Red Hat Category: Experimental August 2016 ISSN: 2070-1721 DNS-Based Authentication of Named Entities (DANE) Bindings for OpenPGP Abstract OpenPGP is a message format for email (and file) encryption that lacks a standardize...
rfc-editor.org/rfc/rfc7929.txt

Minds turned to ash | 1843 https://t.co/H7FRX3lX6Y

Is burnout simply the result of working too hard? Josh Cohen argues that the root of the problem lies deeper than that
1843magazine.com/features/minds…

Hello from Orkut https://t.co/6scYiQNSuO

You may not know me but 12 years ago I started a social network called orkut.com while I was working as an engineer at Google. I'm the guy orkut.com was named after. In 2014 when Google announced that orkut would be shutting down, it was a sad moment for us. orkut had become a community of over 300…
orkut.com

Lesson learnt: between disprin and zandu balm, always choose disprin. Atleast it wont get into your eyes.

To all employees at Tulip Telecom, (sans senior management) you have my salute.

We came, we braved, we survived.

After 100 years, World War I battlefields are poisoned and uninhabitable https://t.co/OiU5Zqwk3A

The damage will be healed in 300 to 900 years.
wearethemighty.com/articles/after…

RFC 7454 - BGP Operations and Security https://t.co/4bYymkU4zw

tools.ietf.org/html/rfc7454

And now for some late night reading

"Secure BGP Project" https://t.co/SN66S4cbCD

The S-BGP architecture employs three security mechanisms. First, a Public Key Infrastructure (PKI) is used to support the authentication of ownership of IP address blocks, ownership of Autonomous System (AS) numbers, an AS's identity, and a BGP router's identity and its authorization to represent an...
ir.bbn.com/sbgp/

Xen exploitation part 2: XSA-148, from guest to host https://t.co/khc8kLgZU2

Xen exploitation part 2: XSA-148, from guest to host Date Wed 27 July 2016 By Jérémie Boutoille Category Exploitation. Tags Xen Exploitation PoC guest-to-host vm escape This blog post describes the exploitation of Xen Security Advisory 148 (XSA-148) [1] (CVE-2015-7835). It has been discovered by Sha...
blog.quarkslab.com/xen-exploitati…

"Look at us. Look at what they make you give."

-The Professor, The Bourne Identity

"The Narasimha Rao they don't want you to know of"

Good insights as always.

@FoundingF https://t.co/VODGu7jjQL

When the political mastermind of Indian economic reforms died, the apocryphal hand of the party he was part of, deserted him. Only a few were there. Those who knew what he really accomplished, like Dr. Manmohan Singh
foundingfuel.com/article/the-na…

In 1971, the U.S. Navy Almost Fought the Soviets Over Bangladesh https://t.co/BufeYtT6S0

warisboring.com/in-1971-the-u-…

Hardening Debian for the Desktop Using Grsecurity https://t.co/qNYHN4STHf

micahflee.com/2016/01/debian…

Laugh and grow fat.

Moxie Marlinspike - A Saudi Arabia Telecom's Surveillance Pitch https://t.co/j2hqJZcyDk

Last week I was contacted by an agent of Mobily, one of two telecoms operating in Saudi Arabia, about a surveillance project that they’re working on in that country. Having published two reasonably popular MITM tools, it’s not uncommon for me to get emails requesting that I help people with their in...
moxie.org/blog/saudi-sur…