We use Google Analytics to analyze our traffic. By clicking "Accept", you consent to our use of cookies. Read more
  • Index
  • About me
  • Résumé
  • Projects
  • Reading List
Coding (13) | Data (25) | Legal (41) | NUS (3) | Security (123) | Server (33) | Untagged (20) | Archives (219)
Oct 16, 2015

Negative space

Sometimes, the lack of information is valuable information.

The Washington Post reports that according to unnamed current and former US officials, the CIA pulled "a number of officers" from the US Embassy in Beijing as a precautionary measure following the breach — precisely because their names would not appear in State Department personnel files believed to have been obtained by Chinese intelligence operatives. - source



Tags: Security

Similar Articles

NTFS Owner Rights for Logging - I recently stumbled across the NTFS Owner Rights security principal. This is an obscure security principal that is used to restrict the rights that the owner of the file has. This can come in ...
GovTech CTF Writeup - Index Forensics - Walking down a colourful memory lane OSINT - Sounds of freedom! Cloud - Find the leaking bucket! Bonus - Bonus flag for submitting Awesome Write-up Walking down a colourful ...
Calling IUnknown COM interface - While completing challenge 9 of Flare-On 7, I found a lack of information out there on reverse engineering COM objects. Most tutorials are written from a developer point of view where the ...
Rules of Engagement in Cyberspace - Rules of engagement is a concept familiar to most military personnels worldwide. The basic premise of having rules of engagement is to ensure an appropriate level of response or reaction to a ...

×
Privacy & Disclaimer | Atom Feed | Sitemap
This site uses the voce theme by Benjamin Lim
Page generated on Mon Feb 9 07:44:01 2026
© 2012-2026 Benjamin Lim