Все анархисты должны знать, как использовать Tails — в этом тексте описываются некоторые дополнительные меры предосторожности, которые вы можете предпринять, и которые имеют отношение к модели анархистской угрозы. Не все модели анархистской угрозы одинаковы, и только вы ...| www.anarsec.guide
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring Application Access Token.| attack.mitre.org
One of the most shocking parts of the recently discovered spying network Equation Group is its mysterious module designed to reprogram or reflash a computer hard drive’s firmware with malicious code. The Kaspersky researchers who uncovered this said its ability to subvert hard drive firmware—the guts of any computer—“surpasses anything else” they had ever seen. […]| WIRED
T1098 | attack.mitre.org
None| nuetzlich.net
We were successfully able to initiate a BusKill lockscreen trigger using a 3D-printed BusKill (DIY USB kill cord) prototype| BusKill