The video from the talk I gave on how to get more public visibility into DPRK consumer technology is now online. Slides for the talk are available here.
Tag: tech
34C3
I’m very excited to have two talks at CCC at the end of the month. The bulk of accepted talks can be seen and voted on at the CCC “halfnarp”. The first talk is on the Internet in Cuba. It expands upon the recent talk I presented at IMC last month, to provide additional color… Continue reading 34C3
Messaging Threat models
I talked yesterday at Bornhack about the current state of secure messaging and the different primitives and threats that groups are working to address. The talk is on youtube. The slides are on this site, as are the directions for dogfooding the talek system.
Initial Measurements of the Cuban Street Network
Internet access in Cuba is severely constrained, due to limited availability, slow speeds, and high cost. Within this isolated environment, technology enthusiasts have constructed a disconnected but vibrant IP network that has grown organically to reach tens of thousands of households across Havana. We present the first detailed characterization of this deployment, which is known… Continue reading Initial Measurements of the Cuban Street Network
TapDance at Scale
I’m excited that the first project I helped on at Michigan will be presented at FOCI next month: An ISP-Scale Deployment of TapDance
Accessing gnome-keyring on a mac
One of the more common password managers in linux environments is the gnome-keyring, which is split into a service (gnome-keyring-daemon), and a user interface (most commonly, seahorse). After a bit of fiddling in the last couple weeks, this system can be compiled to run on a mac, with only a little bit of pain. On… Continue reading Accessing gnome-keyring on a mac
I’ll be talking at Linux Fest Northwest in a couple weeks.
IETF 98
Last week I talked briefly about the state of open internet measurement for network anomalies at IETF 98. This was my first time attending an IETF in-person meeting, and it was very useful in getting a better understanding of how to navigate the standards process, how it’s used by others, and what value can be… Continue reading IETF 98
Another Strike against Domain Fronting
In 2014, Domain Fronting became the newest obfuscation technique for covert, difficult to censor communication. Even today, the Meek Pluggable transport serves ~400GB of Tor traffic each day, at a cost of ~$3000/month. The basic technique is to make an HTTPS connection to the CDN directly, and then once the encryption has begun, make the… Continue reading Another Strike against Domain Fronting
Koryolink Simulator
When I was in Pyongyang a few years ago and had access to a cell phone, I recorded a bunch of the prerecorded messages that you hear when dialing or mis-dialing numbers. I found them to be an interesting glimpse into the view of technology seen in that corner of the world, and helpfully they… Continue reading Koryolink Simulator