Hacker News
- The Linux Security Circus: On GUI Isolation (2011) http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html 84 comments
- Introducing Qubes 1.0 ("a stable and reasonably secure desktop OS") http://theinvisiblethings.blogspot.com.br/2012/09/introducing-qubes-10.html 59 comments
- On CPU backdoors - Trusting hardware http://theinvisiblethings.blogspot.com/2009/03/trusting-hardware.html 56 comments
- Following the White Rabbit: Software Attacks Against Intel VT-d http://theinvisiblethings.blogspot.com/2011/05/following-white-rabbit-software-attacks.html 6 comments
- The Linux Security Circus: On GUI isolation http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html 47 comments
- Qubes Beta 1 has been released (strong desktop security OS) http://theinvisiblethings.blogspot.com/2011/04/qubes-beta-1-has-been-released.html 3 comments
- The MS-DOS Security Model http://theinvisiblethings.blogspot.com/2010/08/ms-dos-security-model.html 26 comments
- Remotely Attacking Network Cards (or why we do need VT-d and TXT) http://theinvisiblethings.blogspot.com/2010/04/remotely-attacking-network-cards-or-why.html 18 comments
- Introducing Qubes OS http://theinvisiblethings.blogspot.com/2010/04/introducing-qubes-os.html 20 comments
- The Invisible Things Lab's blog: Another TXT Attack http://theinvisiblethings.blogspot.com/2009/12/another-txt-attack.html 5 comments
- Evil Maid goes after TrueCrypt http://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-after-truecrypt.html 64 comments
- Proof-of-concept exploit: Intel CPU cache poisoning http://theinvisiblethings.blogspot.com/2009/03/attacking-smm-memory-via-intel-cpu.html 2 comments
Lobsters
- The Linux Security Circus: On GUI isolation (2011) http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html 2 comments linux , security
- X11 isolation between windows http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html 13 comments openbsd
- Partitioning my digital life into security domains https://theinvisiblethings.blogspot.com/2011/03/partitioning-my-digital-life-into.html 2 comments privacy
- Thoughts on Intel's upcoming Software Guard Extensions http://theinvisiblethings.blogspot.com/2013/09/thoughts-on-intels-upcoming-software.html 4 comments netsec
- Converting untrusted PDFs into trusted ones: The Qubes Way http://theinvisiblethings.blogspot.com/2013/02/converting-untrusted-pdfs-into-trusted.html 5 comments netsec
- So Qubes OS 1.0 is finally out. A Xen-based desktop OS using VM's for different purposes (banking, browsing, etc). Can /r/linux review it? http://theinvisiblethings.blogspot.com/ 31 comments linux
- Evil Maid attacks TrueCrypt encrypted PCs - Hackers hope for trusted bootloader in TrueCrypt http://theinvisiblethings.blogspot.com.au/2009/10/evil-maid-goes-after-truecrypt.html 9 comments netsec
- Joanna Rutkowska on partitioning her digital life into security domains. http://theinvisiblethings.blogspot.com/2011/03/partitioning-my-digital-life-into.html 5 comments netsec
- Anti Evil Maid - TPM-based static trusted boot with a primary goal to prevent Evil Maid attacks. http://theinvisiblethings.blogspot.com/2011/09/anti-evil-maid.html 8 comments netsec
- (Un)Trusting the Cloud http://theinvisiblethings.blogspot.com/2011/05/untrusting-cloud.html 3 comments netsec
- The Linux Security Circus: On GUI isolation http://theinvisiblethings.blogspot.com/2011/04/linux-security-circus-on-gui-isolation.html 35 comments linux
- Why the U.S. "password revolution" won't work http://theinvisiblethings.blogspot.com/2011/04/why-us-password-revolution-wont-work.html 21 comments netsec
- Skeletons Hidden in the Linux Closet http://theinvisiblethings.blogspot.com/2010/08/skeletons-hidden-in-linux-closet.html 7 comments netsec
- Linux privilege escalation attack possible via X server http://theinvisiblethings.blogspot.com/2010/08/skeletons-hidden-in-linux-closet.html 7 comments linux
- Evil Maid goes after TrueCrypt http://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-after-truecrypt.html 25 comments netsec
- Trusting Hardware: can we trust our CPUs? http://theinvisiblethings.blogspot.com/2009/03/trusting-hardware.html 33 comments programming
- SMM attack put in perspective http://theinvisiblethings.blogspot.com/ 11 comments netsec
- Attacking Intel® Trusted Execution Technology http://theinvisiblethings.blogspot.com/2009/01/attacking-intel-trusted-execution.html 10 comments programming
- Blue Pill - the near future of malware - subvert any OS undetectably http://theinvisiblethings.blogspot.com/2006/07/blue-pill-hype.html 3 comments reddit.com
- The Blue Pill: undetectable malware (non-linkjacked) http://theinvisiblethings.blogspot.com/2006/06/introducing-blue-pill.html 3 comments reddit.com
Linking pages
- Intel CPU cache poisoning: dangerously easy on Linux | Network World http://www.networkworld.com/community/node/41180?ts= 19 comments
- Intel Small Business Advantage is a security nightmare - SemiAccurate http://semiaccurate.com/2012/05/15/intel-small-business-advantage-is-a-security-nightmare/ 0 comments
- My New Git-based Blog | The Invisible Things https://blog.invisiblethings.org/2015/02/09/my-new-git-based-blog.html 0 comments
- Simon Crosby 'Inverts Your Brain' With Tiny Virtual Machine | WIRED http://www.wired.com/wiredenterprise/2012/06/crosby-bromium-microvisor/all/ 0 comments