Integrating Kasm with MS Azure Internal OIDC

Recently, I faced issues integrating Kasm with Microsoft Azure Internal OIDC due to outdated documentation. After some trial and error, I got it to work. Here's the list of inaccuracies in the documentation. Step 17 is no longer required. sid will be automatically included in the token. You ...

Export Controls on Software

In the context of software, export control has a fairly encompassing definition and restricts the "disclosure of source code to foreign nationals", even if the disclosure occurs domestically, even if no money changes hands, and also if the distribution occurs over the Internet [1], the ...

Territoriality: Internet Crime

I do believe that Barlow's statement still holds some weight today and that states "are not welcome" in cyberspace [1]. In cyberspace, it is companies that jealously guard their jurisdiction and sovereignty as they battle for market share, user retention, all the while collecting massive troves ...

Volume of Digital Evidence

Doctorow states that the most important commodity in today's economy is attention [1]. Each person only has 24 hours in a day to send messages, surf the net, watch video and shop online. Hence, even though the size of hard drives has increased 100 fold from 10GB in 1999 to 1TB in 2013 [2], we ...

Centralization of Digital Evidence

Internet traffic today is highly asymmetric. The top 5 social media sites account for 99% market share of global social media traffic [1]. Crimes ranging from blackmail to phishing scams to bomb threats are largely occurring on the same few social messaging apps and social network sites. Most ...

AI model licensing

There are two main categories of open-source licenses. Firstly, permissive licenses such as Apache 2.0 and MIT allow the license holder significant freedom to use the code even as part of proprietary software that the license holder is developing [1]. Restrictive licenses such as GPL family of ...

Authenticity of Digital Evidence

There are three parts which must all be proven true to meet the "Authenticity" criteria. The evidence must be obtained from the computer in question, the evidence must be "complete and accurate" and it must "remain unchanged" since collection [1]. Proving that the evidence has not been tampered ...

Why Use Commercial Forensic Tools

Like Bart, I also disagree that some of the most influential forensic tools are "open source". There are indeed many open sources tools such as SIFT workstation [1] and The Sleuth Kit [2]. Some forensics analysts also write their own tools and scripts to parse lesser known file formats or ...