Maybe you need a Monaro...
Video by Tuxsudo
I am Sam Bent. In this unique space, technology meets #security, #privacy intersects with the digital underworld, and the complexities of networks like #Tor, #I2P, and other overlay networks are unraveled. My journey has taken me from the depths of the #Darknet and #darkweb.
As an ExDarknet Vendor/Market Admin/Buyer, Author, #YouTuber, Paralegal, Hacker, DefCon/SANS speaker, podcaster, #OSINT & #OPSEC Specialist, and Content Creator, my content spans a wide array of topics.
| YouTube Channle | https://www.youtube.com/@Sam_Bent |
| My Site | https://www.doingfedtime.com |
| Twitter/X | https://twitter.com/DoingFedTime |
| Keybase | https://keybase.io/doingfedtime |
Maybe you need a Monaro...
Video by Tuxsudo
Side-channel attacks on SSH through keystroke timing analysis.
"We show that timing data alone can be used to extract passwords from SSH connections."
- ๐ง๐ถ๐บ๐ถ๐ป๐ด ๐๐ป๐ฎ๐น๐๐๐ถ๐ ๐ผ๐ณ ๐๐ฒ๐๐๐๐ฟ๐ผ๐ธ๐ฒ๐ ๐ฎ๐ป๐ฑ ๐ง๐ถ๐บ๐ถ๐ป๐ด ๐๐๐๐ฎ๐ฐ๐ธ๐ ๐ผ๐ป ๐ฆ๐ฆ๐ by Dawn Song, David Wagner, and Xuqing Tian (2001)
https://people.eecs.berkeley.edu/~daw/papers/ssh-use01.pdf
Hiding 53.5 kilograms of cocaine in a vehicle's exhaust system worked exactly as well as
anyone with basic OPSEC knowledge would expect Revenue officers found it in minutes.
https://www.sambent.com/up-in-smoke-how-x-rays-burned-a-eu3-75m-cocaine-run