Mine #BTC #ETH #BCN #DSH and much more

Sunday, August 7, 2016

DARPA's Cyber Grand Challenge: Early Highlights from the Competition

"Early highlights from the world's first all-machine hacking tournament, DARPA's Cyber Grand Challenge (CGC). 

This computer security competition featured seven High Performance Computers as competitors. CGC took place on Thursday, August 4, 2016."

Learn more at www.cybergrandchallenge.com

Friday, August 5, 2016

Simple Survival Model Earthship

"Aimed at being the cheapest and most affordable Earthship possible.A very simple set of details to put together.
Radically Sustainable Buildings. The Most Versatile and Economical building design in the world.

Earthshipscan be built in any part of the world, in any climate and still provideyou with what you need to survive, with 'modern' amenities, if desired.
The Earthship building method has been evolving 

for over 40 years.


We have come to the conclusion that we (the people of the world)
all need...
disaster or not...

1) shelter/comfortable living space
2) water
3) sanitation (sewage treatment/containment)
4) energy
5) food
6) garbage recycling concepts"

Monday, August 1, 2016

Cybercrime in The Deep Web

"All content not indexed by traditional web-based search engines is known as the DeepWeb. Wrongly been associated only with the Onion Routing (TOR), the DeepWeb's ecosystem comprises a number of other anonymous and decentralized networks. The Invisible Internet Project (I2P), FreeNET, and Alternative Domain Names (like Name.Space and OpenNic) are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems (e.g., for cryptolockers).

We designed and implemented a prototype system called DeWA for the automated collection and analysis of the DeepWeb, with the goal of quickly identifying new threats as soon they appear.

In this talk, we provide concrete examples of how using DeWA to detect, e.g., trading of illicit and counterfeit goods, underground forums, privacy leaks, hidden dropzones, malware hosting and TOR-based botnets."

by Marco Balduzzi & Vincenzo Ciancaglini


Source: Black Hat conference Official