Security in computer science is a huge point every individual and company. Communications (either between humans or human-network or whichever online communication) are susceptible to be sniffed or manipulated.

For example, using http instead of https is insecure (sometimes even tagged by your browser as untrustful) as information that goes through it is not encrypted and someone is able to impersonate your accounts with the collected data. This is why https everywhere and privacy badger are recommended for secure browsing.

But when we say “encrypt”, what are we referring to?

Back in the days when computers weren’t a...


This Saturday (September 16th) is Software Freedom Day, and for this special day I created a repo with a surprise, a printable pdf party hat. This is the image of the party hat:

The repo also includes in Spanish a very brief introduction to what is Software Freedom Day, what is GNU and what is GNU/Linux. Enjoy yourselves!

Originally written in: https://dev.to/terceranexus6/software-freedom-day-party-hat


Last night I wrote a manifesto trying to sum up all my thoughts in my internet censorship investigation. As I made it completely out of the blue as a sketch it was in my mother tongue (spanish) but today I decided to translate it, just in case anyone who don’t speak spanish wanted to read it. The original is in this link. Please feel free to share your thoughts on this! I’d love to read them.

I’m only twenty-one, but still, since I can remember, Our routine has changed considerably. When I was a toddler, internet was...


Recently I’ve been studying about Network Security. For a year, I’ve been using ettercap for pentesting and investigation, I even wrote a Lex app for it, but recently I’ve found a tool which is pretty similar but way better, logs are pretty organized and have better commands. I must say I will be using linux, there are options for network monitoring in Windows, but I’m not going to talk about them in this article.

First of all, network security monitoring allow us to detect and respond to intrusions. The range of the NSM data is:

  • Full content: all...


I’m giving a speech in September in Valencia, Spain, about Internet Censorship and how to fight against it. But the event itself is a huge opportunity to meet people interested in hacking, security and even find job opportunities. So I struggled to think a way to make myself noticed. I spent a while thinking the most geek things, and I selected a few of them, now I’m sharing one:

QR code temporary tattoo linked to my CV webpage. I’m a big fan of tattoos, I already have three, and not long ago I thought “hey it would be cool to...