Buffer Overflow 0x01 A step by step buffer overflow tutorial. We'll cover why buffer overflows exist, how they can be abused to subvert flow of control, and step though an example exploitation in Linux using GDB.
Tor and "Invisibility" Misconstruing Tor as a cloak of invisibility is dangerous.
Curation How can we continue to protect ourselves in an era defined by ubiquitous data collection? Curation!
(Ab)using Tor to circumvent GDPR Utilize Tor to circumvent GDPR in Europe.