Archive for November, 2015

The last three flightworthy WB-57 airplanes in existence arrayed themselves on a runway near Johnson Space Center in Houston this past week, as if they were dinosaurs brought to life.  Continue reading

Fairphone 2 Teardown

Image 1/2: The LCD and cover glass are fused, simplifying removal, but significantly increasing the cost of replacement.

You may have heard a lot about the new Fairphone 2—the small Dutch company has been making waves with its affordable, modular, conflict-free cell phone, and once again, we’re one of the first to get our hands on their latest device. When we tore down the original Fairphone, we were pleased by its modularity and easy access. Today, we’re excited to see what this second-generation, responsibly-designed device has in store for us. Join us as we join the movement! Continue reading

OpenELEC 6.0 released

OpenELEC 6.0

There are two major changes to OpenELEC 6.0 that make this a “must-install.” Continue reading


The Rockchip RK3368 was unveiled at CES 2015 as an octa-core CPU replacing the popular RK3288 CPU. The RK3368 includes eight 64-bit cores which can support 4K video running at 60 fps using H.265 decoding and HDMI 2.0. More important than that to so many people, including me, they all can support Android 5.1 Lollipop! Continue reading

How to make Kodi look like Netflix

Every now and then I come across something that’s just too good not to share. This article is based on a video from KordKutters which definitely falls into that category. Continue reading

The Power of V&V

The Power of V&V

A secure system – especially a system that is used to provide security – has to be trusted. But what underpins that trust? What proof do we have that the main components of our trusted system are implemented properly and won’t fail at a critical moment? We mentioned this point in our last article about Secure OS and, as promised, we return to it here. Continue reading

FEDERAL AUTHORITIES HAVE indicted four men on charges that they hacked into multiple financial institutions and operated a stock-pumping scheme and online gambling operations that netted them more than 100 million dollars.

Continue reading

Message Regarding the ProtonMail DDoS Attacks

We are happy to announce today that after several days of intense work, we have largely mitigated the DDoS attacks against us. These attacks took ProtonMail offline making it impossible to access emails, but did not breach our security. At present, attacks are continuing, but they are no longer capable of knocking ProtonMail offline for extended periods of time. Continue reading


For close to 10 months, a critical vulnerability in a library found in most Java rollouts has been twisting in the wind, unpatched, and until this week without proof-of-concept exploits that people paid attention to. Continue reading

What? The most underrated, underhyped vulnerability of 2015 has recently come to my attention, and I’m about to bring it to yours. No one gave it a fancy name, there were no press releases, nobody called Mandiant to come put out the fires. Continue reading