Public Private Partnerships in Cybersecurity

Living in DC has accorded me a number of privileges. Chief among them is the proximity to government offices as well as many NGOs. I am literally walking distance away from their offices. As a result, I have attended a number of press conferences and panel discussions led by current and former ...

On Physical Authentication

Recently, I moved into a new environment and had the opportunity to witness a number of processes. This experience further reinforced in me the importance of policies over technical measures. Physical authentication is simple compared to its online equivalent. For a small sized population, we ...

Dumping Aztech DSL1015EN firmware

Recently, I had the fortune to come across a spare DSL1015EN router cum modem. After dismantling the external case, this is what the internals look like. On the left, we can see 2 u.fl connectors for the antennaes. If I wanted to, I could get a RP-SMA adapter and hook up some 9-dbi antennaes ...

Cloning Mifare 1K cards

Disclaimer : The information provided here is solely for educational purposes. The system I would be looking at is the ST Electronics' ST8100 Securnet. This is an integrated security management system that includes an access control module that manages physical access to facilities. One of the ...

Flaws of a single ecosystem

The post is triggered by the recent leak of celebrity nude photos. Apple has claimed that the iCloud ecosystem is secure and the leak was the result of targeted attempts. Nevertheless, they eventually decided to tighten the security of the ecosystem. This is not an isolated incident as I ...