Hacker News
- On Sociopaths and Progress https://www.zdziarski.com/blog/?p=12298 30 comments
- Edward Snowden in Hindsight https://www.zdziarski.com/blog/?p=11127 49 comments
- Retro Scams: Authenticating Early Nintendo Systems and Games https://www.zdziarski.com/blog/?p=9830 23 comments
- San Bernardino: Behind the Scenes https://www.zdziarski.com/blog/?p=6335 2 comments
- WhatsApp Forensic Artifacts: Chats Aren’t Being Deleted http://www.zdziarski.com/blog/?p=6143 4 comments
- My Take on FBI's “Alternative” Method http://www.zdziarski.com/blog/?p=5966 86 comments
- Waze: Google’s New Spying Tool http://www.zdziarski.com/blog/?p=4827 9 comments
- How to randomize your MAC address on OS X http://www.zdziarski.com/blog/?p=2738 56 comments
- FiOS vs. Cable During a Windstorm http://www.zdziarski.com/blog/?p=639 13 comments
- Do what defines you http://www.zdziarski.com/blog/?p=596 17 comments
- Apple Approves Nintendo Emulator for iPhone http://www.zdziarski.com/projects/nescaline/ 24 comments
Lobsters
- On The State of Open Source https://www.zdziarski.com/blog/?p=6296 14 comments culture
- Testing for the Strawhorse Backdoor in Xcode http://www.zdziarski.com/blog/?p=5040 4 comments mac , security
- How App Store Apps are Hacked on Non-Jailbroken Phones http://www.zdziarski.com/blog/?p=4002 3 comments ios , reversing
- WhatsApp’s behaviour with deleted data https://www.zdziarski.com/blog/?p=6143 2 comments computerforensics
- Reclassifying Semi-Automatic Rifles under the National Firearms Act https://www.zdziarski.com/blog/?p=6094 74 comments truereddit
- Identifying back doors, attack points, and surveillance mechanisms in iOS devices https://www.zdziarski.com/blog/wp-content/uploads/2014/08/Zdziarski-iOS-DI-2014.pdf 6 comments privacy
- Protecting Your Data at a Border Crossing https://www.zdziarski.com/blog/?p=6918 12 comments crypto
- Protecting Your Data at a Border Crossing https://www.zdziarski.com/blog/?p=6918 18 comments privacy
- A demonstration of how many apps OS X can run with 16GB of RAM https://www.zdziarski.com/blog/?p=6355 762 comments apple
- On The State of Open Source https://www.zdziarski.com/blog/?p=6296 8 comments linux
- [PDF] Backdoors: A Technical Definition http://www.zdziarski.com/blog/wp-content/uploads/2016/05/Backdoors-A-Technical-Definition.pdf 9 comments privacy
- "Due to the technical ineptitude of its authors...the end result is a very dangerous [bill] that will...affect everything from the iPhone you hold in your pocket to how data is transmitted over the Internet, allowing the government to effectively break all electronic commerce and Internet security" http://www.zdziarski.com/blog/?p=6046 215 comments technology
- How Apple Can Make Their FBI Problems Go Away http://www.zdziarski.com/blog/?p=6033 3 comments crypto
- Apple v FBI: "Should the government have carte blanche rights to force anyone to work for them? Should the privacy of people’s entire past be subject to a warrant?...The questions that the [DOJ] is posing, at the very core of the matter, are questions of whether or not we should be a free people." http://www.zdziarski.com/blog/?p=5928 7 comments technology
- On Dormant Cyber Pathogens and Unicorns http://www.zdziarski.com/blog/?p=5849 3 comments apple
- Forensic software requirements and why the FBI is asking Apple for too much http://www.zdziarski.com/blog/?p=5645 46 comments programming
- Code is Law http://www.zdziarski.com/blog/?p=5642 3 comments programming
- TIL that popular driving-app Waze creates unique identifier for your device even if you skip account setup; reserves right to share PII with parent company, Google. http://www.zdziarski.com/blog/?p=4827&t=v 9 comments technology
- Zdziarsky: Waze is Google’s New Spying Tool http://www.zdziarski.com/blog/?p=4827 3 comments privacy
- What You Need to Know About WireLurker http://www.zdziarski.com/blog/?p=4140 19 comments netsec
- Apple Confirms “Back Doors”; Downplays Their Severity http://www.zdziarski.com/blog/?p=3466 121 comments technology
- Researcher reveals that Apple indeed does allow the government into iOS devices, lies to the public about "never letting them in." http://www.zdziarski.com/blog/?p=3441 43 comments apple
- Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices http://www.zdziarski.com/blog/?p=3441 5 comments technology
- Security researcher discovers Apple makes it easy for the US government to access iOS devices http://www.zdziarski.com/blog/?p=3441 29 comments worldnews
- Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices [PDF] http://www.zdziarski.com/blog/wp-content/uploads/2014/07/ios_backdoors_attack_points_surveillance_mechanisms.pdf 13 comments netsec
- Waterboard Advanced Forensic Logical Acquisition for iOS Devices http://www.zdziarski.com/blog/?page_id=2380 9 comments netsec
- OnStar Begins Spying On Customers http://www.zdziarski.com/blog/?p=1270 823 comments technology
- OnStar Begins Spying On Customers’ GPS Location For Profit http://www.zdziarski.com/blog/?p=1270 3 comments reddit.com
- "..an out-of-the-box refurbished iPhone he purchased directly from Apple contained recoverable personal data.." http://www.zdziarski.com/ 3 comments technology