On My Reading List
Why Did Police Kill an Alleged Small-Time Hacker?
What Sam Maloney's software can tell us about his strange life.
FreeNet link 1 (HTML)
FreeNet link 2 (PDF)
FreeNet link 3 (PDF)
Building a Threat Model
What's in a Bitcoin Address
ECDSA, the crypto behind it
How Bitcoin addresses are generated
How can I test if a Bitcoin address is compressed or not
How to generate a valid Bitcoin address for destroying Bitcoins
Bitcoin Talk discussion: Python code for validating Bitcoin addresses
Using Bitcoin Crypto
How to verify Bitcoin deterministic signatures, ZeroNet's source code
Bitcoin protocol in Python: a peak under Bitcoin's hood
Bitcoins the hard way: using raw Bitcoin
Constant-time string comparision
Hardware Backdoor - Rootkit via Ring -3
Reverse-engineering the Intel Management Engine's ROMP module
How to minimize the risk posed by Intel AMT/ME's “ring -3 exploits”?
At the end of the day, there is nothing that you can do with the iCore5.
It has a permanent backdoor that has total access to and control over the rest of the PC.
Mission impossible: Hardening the [rootkit-friendly] x86-based core infrastructures
Tearing apart firmware with your bare hands
More on Hardware Backdoors - Microcode, HWRNG, etc.
“We cannot trust” Intel and Via’s chip-based crypto, FreeBSD developers say
Doping Transistors (University of Massachusetts research)
Backdoors in hardware (ie. Intel/AMD CPU) possible?
/r/AskScience: How could a backdoor be put into a random number generator?
Bull Mountain (RDRAND) on Wikipedia
More on Crypto Backdoors
/r/crypto: What are some interesting crypto backdoors?
Freesite Indexing Services
The not offensive index
This page is a snapshot of ZeroNet. Start your own ZeroNet for complete experience.