avatar  

Desde Interferencias siempre nos gusta colaborar en iniciativas que nos parecen interesantes, y es por eso que tanto el año pasado como este año estamos colaborando en la organización de esLibre: un encuentro de personas interesadas en el conocimiento y la difusión del las tecnologías libres y cultura abierta. Concretamente la edición de este año será totalmente online los días 18 y 19 de septiembre, coincidiendo con el "Software Freedom Day" (que además, también es el cumpleaños oficioso de Interferencias 🌚).

Como...

avatar  

For a few years I’ve been thinking in ways tech could help neighbourhoods into becoming more safe taking advantage of the people collaboration. It first came to me after realizing a neighbour a loved in my home town had some communication problems with the essential services. The whole idea of mine is logistically difficult to perform as so I ended up just theorising for a long time without actually writing a single line of code for that idea. Recently, after a discussion in Mastodon, I realized there are some tiny goals...

avatar  

Disclaimer: All of the following information takes for granted you’ve been hired for it.

One of the best parts of offensive security is the wide range of attacks than can be performed. As the idea is to simulate a real cyberattack, there are several kind of things to do to approach the “victim”. Even most of it involves using various tools in the computer, it also implies physical access, phishing, and getting information though the users of the system. This parts involves a bit of a performance, to learn about what kind...

avatar  

Introduction

Since tech became open and community guided, the fear of developing tools for the users and not for the companies or the government has grown bigger. In recent news a new bill is presented in which Justice Department will be able to require manufacturers of OS and devices as well as communication providers the ability to decrypt data upon request.

The whole point of encryption is to ensure the security of your information. Requiring your information to be safe is not just a matter of “hiding” stuff. Several cyberattacks...

avatar  

Due to my work I tend to use brute force lists a lot, mostly to test incorrect login management. Sometimes I feel I get really close to correct passwords either guessing or using profiling tools. I don’t know if some of you, when it comes to change the default or old passwords you just take your old one and change it a bit. That’s mostly wrong btw.

In any case recently I felt like hand-writing customized lists out of guessing on a text file was a poorly decision, so I decided to...