Help! I am an Investigative Journalist in 2017

Help! I am an Investigative Journalist in 2017

Investigative journalists rely on information sources to write interesting stories. Their work is a significant contributor to democracy and free speech in my opinion. Articles that expose wrongdoings within the private and public sector function as a social control when other channels fail to address an issue. However, certain governments ... Read More
How to Protect Yourself from Malvertising

How to Protect Yourself from Malvertising

/ / Malware, patching, security
Hackers are notoriously clever at committing crimes. Of all the criminal archetypes, they seem to be the most creative; so creative that we were forced to invent yet another word to describe their latest scams. Malvertising — a new shorthand for malicious advertising — is something very different from the ... Read More
Setting up your own Tor Relay

Setting up your own Tor Relay

/ / cryptoparty, encryption, security, tor
Have you ever wanted to contribute to the Tor project, but never knew how to do it? Why not running a Tor relay? The more people running relays, the faster the Tor network will be. This short guide from the recent CryptoParty workshop helps you with launching a virtual machine ... Read More
Helping Reporters Protect Their Information Sources

Helping Reporters Protect Their Information Sources

The information sources of journalists are under constant threat in the age of digital surveillance. Although the confidentiality of information sources is protected by law, secret FISA courts, questionable policing practices and dictatorships regularly circumvent these regulations. To keep investigative articles coming, privacy enthusiasts in Sydney have teamed up to ... Read More
Launching ‘Privacy for Journalists’

Launching ‘Privacy for Journalists’

/ / meetup, Privacy, secops
Reporters are one of the bastions of democracy, as they could expose the wrongdoings of governments, corporates or well-connected individuals affecting the many. With the legal protections shrinking and the technical disparity widening, the protection of information sources is more challenging than ever. Information security experts launch website and community ... Read More
Safe Web Browsing in 2016

Safe Web Browsing in 2016

Choosing modern anti-malware, a search engine, browser and its extensions for security and privacy The post Safe Web Browsing in 2016 appeared first on Rainbow and Unicorn ... Read More
When the CDN Goes Bananas

When the CDN Goes Bananas

Slides on Subresource Integrity from the SecTalks Sydney meetup The post When the CDN Goes Bananas appeared first on Rainbow and Unicorn ... Read More
Command-and-Control Malware Traffic Playbook

Command-and-Control Malware Traffic Playbook

Malicious actors operate command-and-control (C&C/C2) servers to interact with their victims’ computers. These C2 servers are intended to instruct the compromised PCs to do undesired things, such as stealing the user’s passwords, encrypting the files for ransom or attacking other computers on the network. The post Command-and-Control Malware Traffic Playbook ... Read More