Clandestine Cellular Networks:: This paper deals primarily with the lessons learned from fighting insurgents, but it is extremely valuable as a handbook on tradecraft. I previously posted just the tradecraftchapterfor people who don’t want to slog through all of it. I suggest reading all of it...
Penn says he “mirror[ed] through Blackphones,” which are relatively expensivephones sold by Silent Circlethat offer a more secure operating system than a typical off-the-shelf phone. It runs Internet through a VPN (to shield the user’s IP address and encrypt their Web traffic) and end-...
Lots of caveats apply to this report: among other things, the folks at the Telegraph apparently don’t like the Guardian; the linked article is all based on a single source in the UK government, and it’s rather poorly organized; and there’s no indication about how much that single pass...
" ; $ExecutionContext.SessionState.LanguageMode[+] Yeeey, it really worked.It works like a charm!FullLanguage Whereas: Commandwas built of following commands:Base64Encode(XorEncode("Write-Host \"It works like a charm!\" ; $ExecutionContext.SessionState.LanguageMode", 0x31))...
One time use phone, one time pad, and one time laptop. Or a laptop that is cleaned after use, which probably takes a couple hours. All so you can receive a phone call tomorrow. Wouldn’t using the one time pad to encrypt an email sent through Tor be easier, faster, and less expens...