You are viewing a read-only archive of the Blogs.Harvard network. Learn more.
Skip to content

Category Archives: Digital Warfare

Online wars

Cracking 1024 bit RSA keys

The next time someone raves about the advances of computing ask them about this challenge. Truly a benchmark for the next 100 years in computing a paper published by Adi Shamir and Eran Tromer entitled “On the Cost of Factoring RSA-1024” [pdf] hypothesizes a device which could “break a 1024-bit RSA key in one year […]

local irish bar… hacked

While doing some research for the SOURCEboston pub crawl I wandered over to the Tommy Doyle web page. Clearly not a page visited often or cared for much by the owners since it has a anti-war page up stating: Security :0 My test: 1 Who is ‘the real murder’ Bush? You or this baby? [ […]

RIAA webserver compromised

The following url was found on a popular aggregation site,MD5(‘asdf’)),NULL,NULL,NULL,NULL%20– broken down into component pieces the actual sql commands are easier to read: UNION ALL SELECT BENCHMARK(100000000,MD5(‘asdf’)) ,NULL,NULL,NULL,NULL — We can see that the url parameters contain a mysql command to benchmark 10M md5 operations on the string ‘asdf’. The very clear and simple […]


As noted on several other blogs… Psiphon is part of the CiviSec Project run by the Citizen Lab at the Munk Centre for International Studies at the University of Toronto. The CiviSec Project is funded by the Open Society Institute.


Tor is great if you are already encrypting your traffic. It isn’t the best idea if you are doing a lot of clear text related activities. OSX Instructions here The Tor Overview is worth reading through and I can see good uses for this type of tech for globe trotters who may need to bypass […]

Wireless Resources

Wireless Users Groups Bay Area Wireless Users Group NYC Wireless Group Personal Telco Project FRARS Wireless lan working group Boston Area Wireless Internet Alliance GBA 802.11 Greater Boston Area 802.11 Wireless Database DC-WiFi Initiative Public WiFi advocates in Washington DC Seattle Wireless Seattle Wireless group Wardriving Resources Wardriving news […]

How to surf from hostile networks

NYT article claiming to help with the issue of kiosk network connections. They could have keyboard sniffers, network sniffers, or just good old spyware. Print edition

Circumventing censorship

The filtering takes place in at least three ways: de-listed domains: specific websites are removed entirely from search results; it is as if the website never existed. de-listed urls: specific urls are removed from search results if they contain a de-listed domain. restricted keywords: specific keywords are restricted to searches of web pages hosted in […]

Blocking VOIP

Derek Bambauer explains the legal ramifications of Service class blocking.

Wireless Security Review: Kismet++

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Wardriving news portal – Ethereal/Tcpdump compatible data logging – Airsnort compatible weak-iv packet logging – Network IP range detection – Built-in channel hopping and multicard split channel hopping – Hidden network SSID decloaking – Graphical mapping of networks Q: What happens […]