«
Expand/Collapse
61 items tagged "london"
Related tags:
hacks [+],
wednesday [+],
wed [+],
april [+],
security conference [+],
july [+],
call [+],
security [+],
olympics [+],
london olympics [+],
june [+],
january [+],
february [+],
europe [+],
con [+],
vancouver [+],
tweets [+],
tower of london [+],
tower bridge [+],
tower [+],
society [+],
research [+],
read [+],
papers [+],
november [+],
news [+],
misc [+],
may [+],
march [+],
loss [+],
london uk [+],
london riots [+],
kat braybrooke [+],
information society [+],
hacker communities [+],
gender [+],
digital anthropology [+],
cyber attack [+],
cyber [+],
conference [+],
chaos communication camp [+],
call for papers [+],
attack [+],
Hardware [+],
Hackerspaces [+],
20th april [+],
defcon [+],
bugtraq [+],
yuri suzuki [+],
world [+],
willem [+],
wilds [+],
wifi [+],
warn [+],
vandalism [+],
usb [+],
university college london [+],
twitter [+],
tv members [+],
tuesday october [+],
transportation [+],
training [+],
tom [+],
tesla coils [+],
teaching computing [+],
taiwan [+],
system [+],
sutton grammar school [+],
subway system [+],
street artist [+],
stimtone [+],
steve lord [+],
spray paint [+],
source internet [+],
sophos [+],
slingshot [+],
sketch [+],
skateboard [+],
sink [+],
simulator [+],
simon ford [+],
showcases [+],
showcase [+],
service [+],
secret [+],
scammers [+],
russian embassy in london [+],
rioters [+],
researchers [+],
research headquarters [+],
record [+],
radio [+],
radar systems [+],
radar [+],
push [+],
punks [+],
privacy [+],
precision [+],
pond [+],
political [+],
police operation [+],
plenty [+],
ping pong ball launcher [+],
ping pong ball [+],
peripherals [+],
passive radar [+],
overreaction [+],
operational post [+],
operation [+],
october [+],
neutrality [+],
network [+],
nbsp [+],
nazi [+],
nanode [+],
mp martijn van dam [+],
milton keynes [+],
microcontroller [+],
met [+],
martijn van dam [+],
march 31st [+],
map [+],
man [+],
mahieu [+],
london underground map [+],
london design museum [+],
logger [+],
launcher [+],
june 19th [+],
isp industry [+],
internet [+],
infosecurity europe [+],
immune [+],
imminent [+],
hosts [+],
holland [+],
hit [+],
helm [+],
happy new year [+],
hackerspace [+],
gps logger [+],
gps datalogger [+],
gps [+],
genius [+],
full disclosure [+],
forrest [+],
financial crime [+],
explosive charges [+],
evil genius [+],
evil [+],
ethernet [+],
epping forrest [+],
enigma [+],
encoding [+],
embassy in london [+],
embassy [+],
electronics [+],
earls court london [+],
dynamite [+],
dutch isp [+],
dishes [+],
dish [+],
dirty dish [+],
digital computer [+],
defcon 13 [+],
december [+],
ddos [+],
darknet [+],
cyberterrorism [+],
cyberspace [+],
crisis [+],
cracks [+],
controller [+],
contests [+],
contest [+],
con goon [+],
computing [+],
computer [+],
complete security [+],
command bunker [+],
command [+],
christmas [+],
china [+],
broadcast messages [+],
boom goes the dynamite [+],
boom [+],
bbm [+],
balloon altitude record [+],
balloon [+],
august [+],
artwork [+],
art displays [+],
arduino [+],
april 24th [+],
apex team [+],
anonymous [+],
altitude [+],
alpha [+],
alexandre farto [+],
adrian mahieu [+],
abhor [+],
Wireless [+],
General [+],
25th august [+],
24 january [+],
tuesday [+]
-
-
6:32
»
Carnal0wnage
We are hosting two training's at the Attack Research Headquarters over the next few months. The first training is our Operational Post Exploitation class which will be January 29th-January 30th.
We have just added Offensive Techniques in February for an available training as well. We will be hosting the training February 26th-February 28th. More details can be found at our
training website.
We are also looking at doing a round of training in the London area in May of this year. Right now we are trying to gauge the interest in this location. If you are interested in taking either Offensive Techniques or Rapid Reverse Engineering in this are please email training@attackresearch.com so that we can gauge interest.
Happy New Year
-
-
12:01
»
Hack a Day
This is the WHICH, the Wolverhampton Instrument for Teaching Computing from Harwell. It is the oldest functioning digital computer and thanks to a lengthy restoration process you can go and see it in person at The National Museum of Computing in Milton Keynes (Northwest of London in the UK). The system was first put into [...]
-
-
13:01
»
Hack a Day
We love it when PCB artwork is actually artwork. Here’s one example of a radio whose layout mimics the map of London’s subway system. The build is for an exhibit at the London Design Museum. They have an artist in residence program which allowed Yuri Suzuki time and resources to undertake the project. He speaks [...]
-
-
10:01
»
Hack a Day
Turns out you don’t need to be Superman to see through walls. Researchers at University College London have developed a way to passively use WiFi as a radar system. Unlike active radar systems (which themselves send out radio waves and listen for them to echo back), passive radar systems cannot be detected. The system is [...]
-
-
15:08
»
SecDocs
Authors:
Kat Braybrooke Tags:
hacking Event:
Chaos Communication Camp 2011 Abstract: In 2002, Ghosh et al released a study which found that in F/LOSS coder/hacker communities, only 1.5% of members were female. This participation-heavy session is about the challenges of immersive ethnographic research in a time of gender transformation. First, a bit about my background. My name is Kat Braybrooke, I'm a Canadian from Vancouver, and I am currently finishing my MSc thesis for University College London's Digital Anthropology program regarding the role of gender in FLOSS hacker and coder cultures. For this thesis (abstract at http://shehackers.kaibray.com), I engaged in a combination of phenomenological immersivity and informant relationship-building with over 30 hackers and coders (male and female) in hackspaces and recursive tech/'geek' cultures across Europe. When I started my research, I had specific assumptions about who I wanted to talk to and what I thought I'd find. However, through the process of engaging with the spaces and individuals involved in these communities, I have come to realize how incorrect these assumptions were - and I'm hoping these realizations can be of benefit future social scientists, anthropologist and media theorists studying recursive subcultures in periods of ultramodern transformation. This session is about group participation - discussion, debate, criticism and new ideas. I'm not here to tell you who you are. Instead, I want to learn what you, as Chaos Camp attendees, think of these sorts of academic studies of your own communities, and how you feel my methodology can be improved upon. While I'm a self-defined 'geek', I am the outsider here - so before I publish this research, I'd love to hear how my understandings can be improved.
-
14:13
»
SecDocs
Authors:
Kat Braybrooke Tags:
hacking Event:
Chaos Communication Camp 2011 Abstract: In 2002, Ghosh et al released a study which found that in F/LOSS coder/hacker communities, only 1.5% of members were female. This participation-heavy session is about the challenges of immersive ethnographic research in a time of gender transformation. First, a bit about my background. My name is Kat Braybrooke, I'm a Canadian from Vancouver, and I am currently finishing my MSc thesis for University College London's Digital Anthropology program regarding the role of gender in FLOSS hacker and coder cultures. For this thesis (abstract at http://shehackers.kaibray.com), I engaged in a combination of phenomenological immersivity and informant relationship-building with over 30 hackers and coders (male and female) in hackspaces and recursive tech/'geek' cultures across Europe. When I started my research, I had specific assumptions about who I wanted to talk to and what I thought I'd find. However, through the process of engaging with the spaces and individuals involved in these communities, I have come to realize how incorrect these assumptions were - and I'm hoping these realizations can be of benefit future social scientists, anthropologist and media theorists studying recursive subcultures in periods of ultramodern transformation. This session is about group participation - discussion, debate, criticism and new ideas. I'm not here to tell you who you are. Instead, I want to learn what you, as Chaos Camp attendees, think of these sorts of academic studies of your own communities, and how you feel my methodology can be improved upon. While I'm a self-defined 'geek', I am the outsider here - so before I publish this research, I'd love to hear how my understandings can be improved.
-
-
7:01
»
Hack a Day
This USB slingshot controller really brought a smile to our faces. Part of it is the delightfully silly promo video you’ll find after the break. [Simon Ford] combined nature and technology to bring this USB-enabled slingshot into existence. The frame itself is from a branch he found in the Epping Forrest of London. He whittled [...]
-
-
8:01
»
Hack a Day
Members from the London Hackerspace recently got a little on-air time with a ping pong ball launcher. They were invited to build something for the Click show on BBC. The launcher that they built responds to hash tags on Twitter by barraging the audience with balls. The hardware was built in two parts. The first is a [...]
-
-
8:01
»
Hack a Day
Nothing stinks up the house like a sink full of dirty dish. Well, a full trash can will do it to a greater extent, but that’s a project for another day. In what must be an overreaction to a perpetually full sink of dishes at his London Hackerspace, [Tom] built a web-connected dirty dish detector. [...]
-
-
11:01
»
Hack a Day
[Willem] has a friend that wanted to take a GPS datalogger up an unclimbed mountain the wilds of Kyrgyzstan. The GPS logger built for the expedition made it to the summit of Eggmendueluek, but it didn’t work the whole way up. Since the logger came back to London, [Willem] was able to do a complete [...]
-
-
14:01
»
Hack a Day
At 11 AM London time, October 22, the Sutton grammar school for boys is going to be launching Apex Alpha, a high altitude amateur balloon for an attempt at the UK altitude record. Unlike a few other balloons we’ve seen, the Apex team is doing it right and giving everyone the downlink details for the [...]
-
-
11:01
»
Hack a Day
The folks over at Hackspace London have been working hard to create a “very low cost, open source, Internet connected platform on which others can develop their ideas”, which they have dubbed “Nanode”. Essentially an Arduino with Ethernet networking on-board, the Nanode is armed with an ATMega 328 microcontroller along with all the other standard [...]
-
-
6:01
»
Hack a Day
While we see plenty of security-related conferences here in the US, our friends across the pond were apparently anxious to hold a large-scale security conference of their own. At the helm of the first ever 44Con are DEF CON Goon [Adrian] and Penetration Tester [Steve Lord]. The pair are quite involved in London’s security community [...]
-
-
9:20
»
Hack a Day
We abhor vandalism, but we love art. Here’s a skateboard hack that lets skate punks young and old tag their turf while they ride. [D*Face], a multimedia street artist who grew up in London, added a mounting system to the bottom of his skateboard which includes a can of spray paint. We’re a bit surprised that there’s room enough [...]
-
-
14:26
»
Wirevolution
Service providers can offer any product they wish. But consumers have certain expectations when a product is described as ‘Internet Service.’ So net neutrality regulations are similar to truth in advertising rules. The primary expectation that users have of an Internet Service Provider (ISP) is that it will deliver IP datagrams (packets) without snooping inside them and slowing them down, dropping them, or charging more for them based on what they contain.
The analogy with the postal service is obvious, and the expectation is similar. When Holland passed a net neutrality law last week, one of the bill’s co-authors, Labor MP Martijn van Dam, compared Dutch ISP KPN to “a postal worker who delivers a letter, looks to see what’s in it, and then claims he hasn’t read it.” This snooping was apparently what set off the furor that led to the legislation:
“At a presentation to investors in London on May 10, analysts questioned where KPN had obtained the rapid adoption figures for WhatsApp. A midlevel KPN executive explained that the operator had deployed analytical software which uses a technology called deep packet inspection to scrutinize the communication habits of individual users. The disclosure, widely reported in the Dutch news media, set off an uproar that fueled the legislative drive, which in less than two months culminated in lawmakers adopting the Continent’s first net neutrality measures with real teeth. New York Times
Taking the analogy with the postal service a little further: the postal service charges by volume. The ISP industry behaves similarly, with tiered rates depending on bandwidth. Net neutrality advocates don’t object to this.
The postal service also charges by quality of service, like delivery within a certain time, and guaranteed delivery. ISPs don’t offer this service to consumers, though it is one that subscribers would probably pay for if applied voluntarily and transparently. For example, suppose I wish to subscribe to 10 megabits per second of Internet connectivity, I might be willing to pay a premium for a guaranteed minimum delay on UDP packets. The ISP could then add value for me by prioritizing UDP packets over TCP when my bandwidth demand exceeded 10 megabits per second. Is looking at the protocol header snooping inside the packets? Kind of, because the TCP or UDP header is inside the IP packet, but on the other hand, it might be like looking at a piece of mail to see if it is marked Priority or bulk rate.
A subscriber may even be interested in paying an ISP for services based on deep packet inspection. In a recent conversation, an executive at a major wireless carrier likened net neutrality to pollution. I am not sure what he meant by this, but he may have been thinking of spam-like traffic that nobody wants, but that neutrality regulations might force a service provider to carry. I use Gmail as my email service, and I am grateful for the Gmail spam filter, which works quite well. If a service provider were to use deep packet inspection to implement malicious-site blocking (like phishing site blocking or unintentional download blocking) or parental controls, I would consider this a service worth paying for, since the PC-based capabilities in this category are too easily circumvented by inexperienced users.
Notice that all these suggestions are for voluntary services. When a company opts to impose a product on a customer when the customer prefers an alternative one, the customer is justifiably irked.
What provoked KPN to start blocking WhatsApp, was that KPN subscribers were abandoning KPN’s SMS service in favor of WhatsApp. This caused a revenue drop. Similarly, as VoIP services like Skype grow, voice revenues for service providers will drop, and service providers will be motivated to block or impair the performance of those competing services.
The dumb-pipe nature of IP has enabled the explosion of innovation in services and products that we see on the Internet. Unfortunately for the big telcos and cable companies, many of these innovations disrupt their other service offerings. Internet technology enables third parties to compete with legacy cash cows like voice, SMS and TV. The ISP’s rational response is to do whatever is in its power to protect those cash cows. Without network neutrality regulations, the ISPs are duty-bound to their investors to protect the profitability of their other product lines by blocking the competitors on their Internet service, just as KPN did. Net neutrality regulation is designed to prevent such anti-competitive behavior. A neutral net obliges ISPs to allow competition on their access links.
So which is the free-market approach? Allowing network owners to do whatever they want on their networks and block any traffic they don’t like, or ensuring that the Internet is a level playing field where entities with the power to block third parties are prevented from doing so? The former is the free market of commerce, the latter is the free market of ideas. In this case they are in opposition to each other.
-
-
8:36
»
Packet Storm Security Recent Files
The 44Con 2011 call for papers has been announced. 44Con is the UK's largest combined security conference and training event, with the conference taking place on the 1st and 2nd of September, 2011 at a five star hotel near Tower Bridge and the Tower of London.
-
8:36
»
Packet Storm Security Misc. Files
The 44Con 2011 call for papers has been announced. 44Con is the UK's largest combined security conference and training event, with the conference taking place on the 1st and 2nd of September, 2011 at a five star hotel near Tower Bridge and the Tower of London.
-
-
14:01
»
Hack a Day
The London Hackspace crew was having a tough time getting their Kinect demos running at Makefair 2011. While at the pub they had the idea of combining forces with Brightarcs Tesla coils and produced The Evil Genius Simulator! After getting the go ahead from Brightarcs and the input specs of the coils they came up [...]
-
-
7:29
»
Packet Storm Security Recent Files
The International Conference on Information Society (i-Society 2011) Call For Papers has been announced. It will take place from June 27th through the 29th, 2011 in London, UK.
-
7:29
»
Packet Storm Security Misc. Files
The International Conference on Information Society (i-Society 2011) Call For Papers has been announced. It will take place from June 27th through the 29th, 2011 in London, UK.
-
-
9:31
»
Hack a Day
[Alexandre Farto] is known for some off the wall art displays, but his newest work takes the phrase literally. Using precisely placed explosive charges, he has been sculpting portraits and other murals on walls in various places around London. The detail at which he is able to produce these images is incredible, considering he is [...]
-
-
14:05
»
Hack a Day
Who is ready to win some tickets to the PUSH N900 Showcase?
The showcase is an event where all 5 teams from the Push N900 competition are going meet up in London and present their N900 hacks. Including N900s that fly, skate, Etch a Sketch(TM), and more. We also hear there is going to be a [...]