Someone Created a Tor Hidden Service to Phish my Tor Hidden Service
. Investigating an
Encrypted email is still a pain in 2017
. A rant about my experiences trying to set up GPG. Send me GPG-encrypted mail if you can work out how, and if I can work out how I'll reply.
How to defeat naive image steganography
. Analysis of a simple image steganography method, and how to defeat in a simple case. Also some discussion about why it also works in harder cases.
How (and why) to make your software faster
. Talks in broad strokes about how to make any arbitrary piece of software faster, and the benefit that brings. Sales pitch at the end. Not yet resulted in any sales.
Secrets of the Medtronic MyCareLink Patient Monitor
. I acquired a piece of medical equipment and cracked it open to see what was inside (spoiler: it's a Linux system, I know this!). Quite an interesting reverse-engineering exercise.
How to close a running process's socket
. Using gdb to unstick a process which is blocked on a disconnected socket.
Steganographic Bitcoin seeds: Hiding cash in plain sight
. Using a Markov model to generate articles which encode Bitcoin seeds.
James Stanley -