How to build a "burner device" for DEF CON in one easy step

How to build a "burner device" for DEF CON in one easy step

| | build, burner laptop, burner phone, defcon, HowTo
TL;DR: Don't build a burner device. Probably this is not the risk you are looking for.IntroductionEvery year before DEF CON people start to give advice to attendees to bring "burner devices" to DEF CON. Some people also start to create long lists on how to build burner devices, especially laptops ... Read More
Recovering data from an old encrypted Time Machine backup

Recovering data from an old encrypted Time Machine backup

| | forensics, macos, NAS, time capsule, time machine
Recovering data from a backup should be an easy thing to do. At least this is what you expect. Yesterday I had a problem which should have been easy to solve, but it was not. I hope this blog post can help others who face the same problem.The problem1. I ... Read More
Why (I believe) WADA was not hacked by the Russians

Why (I believe) WADA was not hacked by the Russians

| | attribution, Hack, Russia, Threats & Breaches, WADA
Disclaimer: This is my personal opinion. I am not an expert in attribution. But as it turns out, not many people in the world are good at attribution. I know this post lacks real evidence, and is mostly based on speculation.Let's start with the main facts we know about the ... Read More