go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

Search results for "silk road"

Go to Homepage, contents or to navigation menu



Silk Road 2 Founder Dread Pirate Roberts 2 Caught, Jailed for 5 Years – Motherboard

This is quite interesting. I’m looking at twitter and found this. I never knew who was behind the 2nd part of the silk road, but knew there was a second version of it Very interesting.

Source: Silk Road 2 Founder Dread Pirate Roberts 2 Caught, Jailed for 5 Years – Motherboard

Comments (0)

Walkthrough Of Tor, Silk Road, Deep Web – Business Insider

Walkthrough Of Tor, Silk Road, Deep Web – Business Insider.

This is something I think you should read. A two page article dealing with the underworld using TOR, although like it says, there are uses that are legal with the service. I’ve never tried it, I wonder if it is accessible?

Comments (0)

Solar Wind update: update as of December 19, 2020

Continuing to read on December 18, 2020, there are some articles that came across my desk.


Security Notification: SolarWinds Supply Chain Attack is the first article. This came from Lastpass and was written by someone by the name of Ian Pitt. As I’ve said before, some of these articles I’m linking to may be behind, but worth the read anyhow. The reason this article is of importance is because of what LastPass and LogMain do, secure our lives by making a password manager that can do so much.

I really like the transparancy this company gives us in to their strategy and understanding of the issue(s) they must face to prevent a big time problem. While LastPass have had issues just like any other company, this company has been transparent behind what they’ve disclosed and what they’re doing about it.

I really think that this article should be read, because of the work they do.


We know that our current President, president Trump has not really said anything about the Solar Winds fiasco. While he ahs fired multiple people because he feels the election is fraud, and he continues to make waves with his lawsuits, I do have to give praise to Mr. Biden for coming out and saying he’ll be looking in to this. The article Biden says he will ‘elevate’ cybersecurity as US hack investigation goes on seems very promising.

In my discussions with someone, they had told me that Mr. Biden has pretty much taken the same people our former president Obama took, and he’ll not really do anything as he’s a puppet to the agenda. I’m not sure, I guess we’ll see for now about all that, but the fact that he’s saying he’ll be looking in to this and bulster the landscape is a good sign. I have no idea really who Biden is, but now is his time to shine in the limelight of what our efforts are in this field.

I believe that cybersecurity should be imperative everywhere, it is something we should all be doing whether it is government or otherwise. The fact that the Government has said to do certain things, yet a big huge breach like this in the supply chain goes unnoticed for months. The Government should be at the top of their game.

This article also goes in to account and says that it is now the Russians that had something to do with this, not the Chinese as first reported.

As I’ve written many times, we’re still learning about this. Speaking of learning, I’ve got my Trend Micro blog issues resolved, and I’ll be reading more about Suntrust, the supposed problem that has plagued the government. I’ll also get back to posting the news and talking about what I’ve seen from there now that I got this resolved. So there is definitely more coming on this front.


Speaking of the Supply Chain which Trend Micro has covered numerous times, the last article for now seems to cover the supply chain as it is entitled SolarWinds hack exposes underbelly of supply-chain attacks and it was quite interesting.

Hackers of lore are often depicted breaking into prominent targets by typing frantically on keyboards in dark rooms and yelling “I’m in!” when they’ve
purportedly breached their victim’s systems. But the sweeping SolarWinds breach, which has reportedly impacted the U.S. Treasury and Commerce departments,
shows the reality is much less flashy and can be far more devastating.

This is why I’ve never really liked the idea of Crime Scene Investigation because its a 30 minute program that may talk about a particular crime which they enact. If it was a hacking crime they covered, they hit a few buttons and they’re in and can find the bad guys.

This is not how this works, and I’ve known this. This is why I liked Dragnet, because even though it was a 30 minute show, they said that time passed by mentioning a date, a time, a place, where they were and what was happening. If these other CSI shows did this, I could have gotten in to it, and my family for years would watch it. I watched one and it didn’t feel realistic to me.

Even when we talked about some of the things like Dread Pirate Roberts who was eventually jailed, I knew it was quite a long time before he was caught. Even when we released podcast 216 back in 2015 we’ve read a bunch on that, and several articles were quite good.

If we’re ever going to get to the bottom of the supply chain problem like Solar Winds, we need to take in what is going on just like they did with Silk Road, Pirate Roberts, the articles that were covered in 216 and even others that have been arrested afterword.

The problem is that Solar Winds have now 300,000 customers which is the latest number, and they include:

the likes of the Pentagon, the Navy, the Army, Cyber Command, the FBI and the departments of Homeland Security,
Defense and Health and Human Services

which makes this more important to make sure that you’re as up-to-date as possible. The number we saw was 18,000 and I wrote that it is probably much more and not everything is known.

Do you think Solar Winds reminds you a little bit like the small company, Philmore, whom we’ve talked about in many podcasts?


That’s it. Lots of linked stuff in all articles, let the reading begin.You can search out any of the terms throughout the Internet you want and feel free to comment onm this or anything else we have to offer.

Comments (0)

What has been read, blogged, and talked about: News ending November 7, 2020

Hello folks, welcome to another blog post talking about what has been read, blogged, and talked about within the last week and few days. Yes, its better late than never, but sometimes other projects and things get in the way.


According to this week in security news ending November 6, 2020, there has been a lot including a Ransomware gang aquiring malware. It also has an article about the Google Drive Scam that I also posted to the blog.

An article asks the question about cybersecurity for small businesses and what protection may be out there. There are a lot of cybersecurity people out there and new ones to boot. An article talks about education and encouraging those stars to come forward.

This is just some of whats out there in this blog post from last week: This Week in Security News: US Cyber Command Exposes New Russian Malware and REvil Ransomware Gang ‘Acquires’ KPOT Malware for you to peruse.


In the governmental side, the United States takes control of more domains when it comes to influencing campaigns. To learn more, read: US seizes more domains with ties to suspected Iranian influence campaign from Cyberscoop’s Joe Warminsky.


In the biggest seizure, the department of justice, part of the United States arm seizes a billion dollars of silk road’s crypto currency. This is the largest seizure ever made to my knowledge. As we know from talking about this on the tech podcast, the operator was arrested thanks to a mistake that leaked his IP. I’m not saying that TOR was the cause of the leak, we honestly don’t know, but you can check out this latest blog post about the 2nd silk road to see the latest, as well as looking at this silk road search page from the tech blog directly. There aren’t that many blog posts, but some link to article through podcast show notes. If you want those podcasts, please contact me, Jared, and I’ll get you copies. Let me know what number you want. For details on this latest, check out DOJ seizes $1 billion in cryptocurrency tied to Silk Road dark web market by Tim Starks on Cyberscoop.


At the time of writing, it has been decided, although as predicted by some, it isn’t going to be a smooth transition in regards to our election. This won’t be the end of the misinformation and disinformation that we see. Election-related misinformation is spilling into the real world. Just look at Arizona. should be read for all of the latest on this problem.

I normally don’t talk about spam I get in my email, but as I read this particular email coming from my contact form, the domain is still up. Its going to be almost a week old, and it isn’t what you think. Just saw the best email ever … in my inbox … domain is relatively new links to a copy of this email which has me go to a page on a domain called emailhostsecurity.com which is very questionable at best. At the time of writing, the domain may have been taken down, it looks to go nowhere, and a domain lookup yields nothing. The article when published, talked about when it was registered but yielded nothing else that was public at the time. Maybe the phone call I placed last week yielded results, however, I do not know for sure and am unable to prove anything. I do know that it isn’t an email security company and the page was definitely suspicious. The name caught my attention, but what was on it was something that you would really question if you’ve been around my blog for years.


In the sickening but true in the new internet age, I blogged about an Oklahoma man that was caught doing something he wasn’t supposed to do. Why bring it up here? If you care about security, here is NOT! what you want to use social media for. In my blog post Oklahoma School Employee Arrested On Multiple Child Porn Charges I link to an article from the same name. The gentleman, if you call him a gentleman, used social media to share what he apparently did with children. The worst part is that he worked for the Oklahoma school district. Oh boy. …


Think paying a ransome is a great idea? Thought about it as a solution? Maybe my article talking about a krebs on security article may change your mind. My blog post is entitled We’re sorry we fucked you over: why paying a ransome may not be the best thing to do and I quote the best part from that article in mine. It said:

“ “When you look at a lot of ransom notes, you can actually see groups address this very directly and have texts that say stuff along the lines of, Yeah,
you are fucked now. But if you pay us, everything can go back to before we fucked you.’” ”

This has got to be the best quote and line ever. It ended that article pretty much.



There is more on the blog that I didn’t cover, but this is a subset.

Here are others that might be of interest that I didn’t blog that goes back to the end of October.

Thanks so much for reading and checking out the blog! Remember, some of this may or may not be talked about in podcasts, and you definitely have your say. Unlike elections which may or may not be fair, I will give you an opportunity to contribute. Send your files to me through dropbox, wetransfer, my send space drop box, or any other service you’d like. It can be wave, mp3, m4a, or any other format you want. I don’t limit on time, and let me know whether you want the airing on the tech podcast or the security box. I thank you so much for listening, reading, and contributing anything on your mind! See you next time.

Comments (0)

technology podcast 216 for July 17, 2015

Hi folks,
As I write, I am currently uploading technology podcast 216 to the the RSS feed where it lives. It is mainly an IOS based podcast, with a podcast segment on articles with a theme. If the show notes did not appear in the RSS when you went to the feed, we are providing the notes below.


Welcome to Podcast 216 for July 17, 2015. On this podcast, we have quite a bit of IOS discussion. We have an updated Capital One update since podcast 197’s running of the demo. Listten to podcast 197’s demo of the app by using this link. We talk about some articles that have a theme, and they are good ones. We also have a comparison between The Transit App and go metro version 3. listen to go metro version 2.x by listening to this file as we talk briefly about that as well. Here are the articles and apps we talk about within this podcast.

articles:

Apps:

We hope you enjoy the 1 hour and 58 minute podcast, and we’ll see you on another edition very soon! Thanks for listening!


It is now available, so we hope you enjoy!

Comments (0)

TOR is talked about in a book I’m reading

Hi folks,
I’ve got a brand new podcast, which I’ve mentioned here before called the Books Podcast. On this podcast, the books read are talked about in podcasts, like this podcast which hasn’t had one in quite awhile. I also have an accompanying blog which posts books my co-host Janet and I are currently reading, whether it is for the podcast or not. That may be our choice. The current book I’m reading is This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information by Andy Greenberg. It is not available on BARD as of yet, but maybe soon as some of the books on the podcast recently appeared there. In chapter 4, this book is talking about the Tor (anonymity network) which Steve Gibson talked about on Security Now a weekly security podcast which I subscribe. More recently, I published an article talking about how TOR now has services on it, just like the normal Internet. The difference between these services and the services you and I use are the very different. The services on TOR can’t be traced, so illegal activity such as child pornography, drug sales, and more can go on without law enforcement supervission. Chapter 4 of the above mentioned book is talking about this very thing. Here is the blog post I posted on the books blog about This Machine Kills Secrets in case you don’t want to go to Amazon right away. Byron Lee recommended this book, and so far I’m enjoying it. Things like TOR, or any anonymous service you may choose to use is only as secure as the users using them. I don’t think I’d personally use it for every day use, but I’d sure keep it in mind in cases i could see a use for, but not at the current time. I find it interesting that this book brings it up and some of the things that were discussed in articles and Security Now being in this book. The article in question that goes in to detail is Walkthrough Of Tor, Silk Road, Deep Web – from the Business Insider is the article I mention where the link to the article is within that post. Is this a coincidence or could TOR not be as secured as first built? I’m going to continue to read this book to find out, and I’d be interested in your thoughts. I recommend you use the comment system if possible or to send me an E-mail. View our about page here on the blog for contact information. The comment boards await you.

Comments (0)

Technology blog and podcast, podcast 177 is now available!

Edited on 3/14 for HTML issues.

Get your copy via the RSS feed. Here are the show notes.


Welcome to podcast 177 of the Technology blog and podcast. This podcast has been marked as time allows right now, and I have time to do one because we have a topic. There’s A Secret Internet For Drug Dealers, Assassins, And Pedophiles is the article I posted on this blog as well as the AMW Reloaded blog. AMW Reloaded’s Jared Rimer, Janet Quam, and Melissa Harrell talk about the article. Then, Steve Gibson from GRC from Security Now has his segment from episode 394 which I cut from that podcast. I hope to have more podcasts when I have something of interest to talk about without reairing everything under the sun. Enjoy!

Comments (0)

go to sections menu


navigation menu

go to sections menu