Posts

[Meta Analysis] Rick n Morty S1E10 : The Internet Privacy Episode (Part 1)

[meta analysis] Rick n Morty S1E4 : Simulation Theory and Machine Learning

[Meta Analysis] Rick 'n Morty S3E1: The Hacker's Episode

[Philosophy] A discussion on the realities of belief

[Philosophy] Thoughts on the ontological duality of software data and instruction

[Philosophy] The ontology of software

Context based Entropy : How to use keyed-steganography

[OPINION] How AI will change Information Security

Why Security exceptions shouldn't exist.

Why geeks should "get" fashion

[RANT] Why Browsers are a crazy idea

[Idea] False Biased Extraction for SQLi using Prime numbers

Abusing WebVTT and CORS for fun and profit

Stealing Secrets with CSS : Cross Origin CSS Attacks

The Vaudenay Attack : A practical example

Padding Oracle Attacks : The other padding that killed your secret key

Automated DEX Decompilation using Androguard part II: Dex2Java

Automated DEX Decompilation using Androguard

About addJavascriptInterface abuse in Android Browsers

Path Traversal Vulnerability in OI File Manager for Android