Skip to content

Instantly share code, notes, and snippets.

View jwilkins's full-sized avatar

Jonathan Wilkins jwilkins

  • San Francisco, CA
View GitHub Profile
@jwilkins
jwilkins / gist:5997296
Created July 15, 2013 03:23
Remotely deplete entropy on linux boxes via SYN scan
# Heroku box
heroku$ curl icanhazip.com
54.242.20.250
heroku$ cat /proc/sys/kernel/random/entropy_avail
3962
###########
attacker$ sudo nmap -sS -p 1-65535 54.242.20.250
heroku$ cat /proc/sys/kernel/random/entropy_avail
@jwilkins
jwilkins / rngtest.log
Created July 15, 2013 03:30
effects of low entropy on linux
$ rngtest -c 200000 -b 2000 < /dev/urandom
.....
rngtest: bits received from input: 4000000032
rngtest: FIPS 140-2 successes: 199848
rngtest: FIPS 140-2 failures: 152
rngtest: FIPS 140-2(2001-10-10) Monobit: 24
rngtest: FIPS 140-2(2001-10-10) Poker: 15
rngtest: FIPS 140-2(2001-10-10) Runs: 60
rngtest: FIPS 140-2(2001-10-10) Long run: 54
773 ɪ
750 ə
547 n
489 t
480 ː
393 d
334 s
327 a
304 l
296 e
@jwilkins
jwilkins / reval.rb
Created January 18, 2014 07:11 — forked from postmodern/reval.rb
#!/usr/bin/env ruby
#
# Name: reval.rb
# License: MIT
# Author: postmodern (postmodern.mod3 at gmail.com)
# Description:
#
# Re-evaluates a specified Ruby file whenever the file changes.
# Reval was inspired by Giles Bowkett's kickass talk on Archaeopteryx at
# RubyFringe 2008, where Giles used some mad Ruby to re-evaluate his
#!/usr/bin/env bash
# Loads and mounts an ISO over SMB via the
# SuperMicro IPMI web interface
#
# usage: supermicro-mount-iso.sh <ipmi-host> <smb-host> <path>
# e.g.: supermicro-mount-iso.sh 10.0.0.1 10.0.0.2 '\foo\bar\windows.iso'
set -x

Journalism can be a high-risk activity, and some stories are a lot riskier than others. In a part one we covered the digital security precautions that every journalist should take. If one of your colleagues uses weak passwords or clicks on a phishing link, more sophisticated efforts are wasted. But assuming that everyone you are working with is already up to speed on basic computer security practice, there's a lot more you can do to provide security for a specific, sensitive story.

This work begins with thinking through what it is you have to protect, and from whom. This is called threat modeling and is the first step in any security analysis. The goal is to construct a picture -- in some ways no more than an educated guess -- of what you're up against. There are many ways to do this, but this post is structured around four basic questions.

  • What do you want to keep private?
  • Who wants to know?
  • What can they do to fi
@jwilkins
jwilkins / gist:c298e419b6483aadd181
Created February 13, 2015 23:00
public pgp key ids == 0x00000000
gpg --keyserver pgp.mit.edu --recv-keys 00000000
gpg: requesting key 00000000 from hkp server pgp.mit.edu
gpg: key 00000000: public key "Thorsten Rapp <[email protected]>" imported
gpg: key 00000000: public key "Julian Blake Kongslie (Born 1985-Mar-03 in Portland, OR, USA)" imported
gpg: key 00000000: public key "Nicolas Le Gland <[email protected]>" imported
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 3 signed: 1 trust: 0-, 0q, 0n, 0m, 0f, 3u
gpg: depth: 1 valid: 1 signed: 0 trust: 1-, 0q, 0n, 0m, 0f, 0u
gpg: next trustdb check due at 2017-12-21
gpg: Total number processed: 3
http://www.reddit.com/r/Bitcoin/comments/2k7a46/sidechains_merge_mining_and_mining_centralization/clj1sls
https://bitcointalk.org/index.php?topic=205533.msg2149057#msg2149057
https://bitcointalk.org/index.php?topic=206303.0;all
http://www.reddit.com/user/adam3us
http://www.reddit.com/user/nullc
http://www.reddit.com/user/pwuille/
https://bitcointalk.org/index.php?action=profile;u=101601
https://en.bitcoin.it/wiki/User:Gmaxwell/alt_ideas
NOTE: sounds decent for desktops/laptops, but servers gain no benefit (and are presumed to be out of scope) - jwilkins
> - floating ADC inputs, as Peter suggested;
> - five independent RC oscillators.
I've got another idea that requires no extra hardware. I think has a
solid theoretical basis which I've explored below in sufficient detail
to raise suspicions that I miss my old line of work:
tl;dr: Record the dt time between button clicks, adding dt to the

============

MAPS

Debug KeyStore

keytool -list -v -keystore ~/.android/debug.keystore -alias androiddebugkey -storepass android -keypass android

ADB