Vidéo explosion nucléaire ( hoax_scam-arnaque )
https://www.youtube.com/watch?v=MzaN2x8qXcM
"On the 17.06.2007 art group Ztohoven-secretly altered Czech TV broadcast. They inserted footage into the Panorama program of ČT2 channel showing illusionary nuke explosion in picturesque setting of Krkonoše Mountains."
---
Conférence @aksioma
https://vimeo.com/162366703
Ztohoven - The Media Reality / Citizen K / The Moral Reform ::
"Ztohoven is a Czech artist collective known for its artistically motivated pranks. The group consists of a core of around 20 regularly active artists, rising to around 100 when additional participants are called upon for a particular task. The group aims to use familiar tools and methods to challenge public perceptions of society."
2016 Kafka
http://aksioma.org/ztohoven/
"Dans le jargon de la sécurité informatique, un honeypot est une méthode de défense active qui consiste à attirer, sur des ressources, des adversaires déclarés ou potentiels afin de les identifier et éventuellement de les neutraliser."
Projet de lutte contre le spam
https://www.projecthoneypot.org/
HP en français, leur fonctionnement, les stratégies, quelques tutos ressources
http://igm.univ-mlv.fr/~dr/XPOSE2009/botnets/honeypot.html
Liste d'HP en anglais
https://github.com/paralax/awesome-honeypots
https://www.smokescreen.io/practical-honeypots-a-list-of-open-source-deception-tools-that-detect-threats-for-free/
@WeMakeArtNotMoney
" Malware: What if we looked at computer viruses as works of design?
Het Nieuwe Instituut, a museum in Rotterdam dedicated to architecture, design and digital culture, has recently opened an exhibition that challenges visitors to look at the inventive and creative side of cybercrime. What if malware were not just damaging pieces of software but also anonymous works of design? "
...
CryptoLocker, Bitcoin, DDOS
"In 2012 the Carna botnet was built and unleashed on the world. But it didn’t have any intentions on doing anything malicious. It was built just to help us all understand the Internet better. This botnet used the oldest security vulnerability in the book. And the data that came out of it was amazing.
The Carna botnet was used to scan the internet to create a map of where all the public facing computer are in the world. The map it created is remarkable."
Newstweek is a device for manipulating news read by other people on wireless hotspots. Built into a small and innocuous wall plug, the Newstweek device appears part of the local infrastructure, allowing writers to remotely edit news read on wireless devices without the awareness of their users. 2011
Newstweek was developed by @Julian_Oliver and @Danja_Vasiliev ( membres du @The_Critical_Engineering_Working_Group )
// Newstweek project page: http://newstweek.com
http://web.archive.org/web/20170804214357/http://newstweek.com/
à propos de Vending Private Network VPN
In this talk, @Danja_Vasiliev gives an overview of "dark internet topologies" in the context of the commissioned piece //Vending Private Network// he did together with @Julian_Oliver ( 2018 )
![vpn]https://criticalengineering.org/projects/vending-private-network/images/title3.jpg)
Conf
Cite cette carte des câbles sous-marins :
https://www.submarinecablemap.com
Are.na ( adhoc_mesh_ntwrk )
https://www.are.na/vincent-bonnefille/adhoc_mesh_ntwrk
Membre du https://criticalengineering.org
@The_Critical_Engineering_Working_Group
2022 EDIT
- Submarine Cable Map 2015
https://submarine-cable-map-2015.telegeography.com/ - Traceroute mapper ( tool git )
https://stefansundin.github.io/traceroute-mapper/?trace=traceroute%20to%2083.118.202.51%20(83.118.202.51)%2C%2030%20hops%20max%2C%2060%20byte%20packets%0A%201%20%20livebox.home%20(192.168.1.1)%20%204.040%20ms%0A%202%20%2080.10.253.25%20(80.10.253.25)%20%209.688%20ms%0A%203%20%20*%0A%204%20%20*%0A%205%20%20ae51-0.nridf101.rbci.orange.net%20(193.252.98.94)%20%2012.098%20ms%0A%206%20%20*%0A%207%20%20*%0A%208%20%20*%0A%209%20%20*%0A10%20%20*%0A11%20%20*%0A12%20%20*%0A13%20%20*%0A14%20%20*%0A15%20%20*%0A16%20%20*%0A17%20%20*%0A18%20%20*%0A19%20%20*%0A20%20%2051.202.118.83.in-addr.arpa.celeste.fr%20(83.118.202.51)%20%2010.492%20ms%0A - History souces
JavaScript is dangerous! Why? How are websites vulnerable to it? Find out about bug-bounties from @Tom_Scott
Artists
. @!Mediengruppe_Bitnik
.. (design by Christoph Knoth and Konrad Renner)
. Date
.. 2017
. Description
.. !Mediengruppe Bitnik’s first monography injects code on online bookstores through its title: a line of Javascript that displays an alert popup.
Scammers have taken an old browser scam and invigorated it using a clever and new tactic that takes advantage of your web browser's full-screen mode to show a fake Windows 10 desktop stating your computer is locked.
This type of scam is called a police browser locker. which pretends to be law enforcement locking your browser because due to illegal activity. These scams then state that if you pay a fine via a credit card, it will unlock your computer so you can use it again.
The menu ::
Egg and bacon
Egg, sausage and bacon
Egg and spam
Egg, bacon and spam
Egg, bacon, sausage and spam
Spam, bacon, sausage and spam
Spam, egg, spam, spam, bacon and spam
Spam, spam, spam, egg, and spam
Spam, spam, spam, spam, spam, spam, baked beans, spam, spam, spam and spam
Lobster thermidor aux crevettes with a Mornay sauce garnished with truffle pâté, brandy and with a fried egg on top and spam
Spam, sausage, spam, spam, spam, bacon, spam, tomato and spam (this is only in the LP version's menu, but the TV version features the Hungarian trying to order it)
[ "Spam" is the twenty-fifth episode of Monty Python's Flying Circus. ]
[ {{ "Spam is the last sketch } of the "Spam" épisode } ]
Best définition online (vo) :
https://www.dailymotion.com/video/x5v0vml
Leaks of datas
HTTPS , HSTS ,
Referrer Policy ,
Content Security Policy ( CSP )
...
Check security on your website
From : https://neustadt.fr/essays/against-a-user-hostile-web/