Review attack surface on Telegram example

It’s been a while since I wrote something here… Let’s dig an iceberg of “security in general” again. This is a very brief review that is using Telegram mobile application, which connects through the mobile network to a remote server, just as an example. The attack surface may be different for you, but it can still contain the same basic elements (not always). Application layer (Telegram app) Libraries OS + backups Device + GSM stack Network layers API service + some backend Third-party services 1.
Read more →

Some of non technical must read books

Read more →

[outdated] Information security in generic

Read more →

[archive] Sun eclipse Mar/2015

Read more →

[archive] unconquered

I will just keep it here for no reason: Out of the night that covers me, Black as the pit from pole to pole, I thank whatever Gods may be For my unconquerable soul. In the fell clutch of circumstance I have not winced nor cried aloud. Under the bludgeonings of chance My head is bloody, but unbowed. Beyond this place of wrath and tears Looms but the horror of the shade, And yet the menace of the years Finds and shall find me unafraid.
Read more →