The last three flightworthy WB-57 airplanes in existence arrayed themselves on a runway near Johnson Space Center in Houston this past week, as if they were dinosaurs brought to life. Continue reading
Archive for November, 2015
You may have heard a lot about the new Fairphone 2—the small Dutch company has been making waves with its affordable, modular, conflict-free cell phone, and once again, we’re one of the first to get our hands on their latest device. When we tore down the original Fairphone, we were pleased by its modularity and easy access. Today, we’re excited to see what this second-generation, responsibly-designed device has in store for us. Join us as we join the movement! Continue reading
There are two major changes to OpenELEC 6.0 that make this a “must-install.” Continue reading
The Rockchip RK3368 was unveiled at CES 2015 as an octa-core CPU replacing the popular RK3288 CPU. The RK3368 includes eight 64-bit cores which can support 4K video running at 60 fps using H.265 decoding and HDMI 2.0. More important than that to so many people, including me, they all can support Android 5.1 Lollipop! Continue reading
Every now and then I come across something that’s just too good not to share. This article is based on a video from KordKutters which definitely falls into that category. Continue reading
A secure system – especially a system that is used to provide security – has to be trusted. But what underpins that trust? What proof do we have that the main components of our trusted system are implemented properly and won’t fail at a critical moment? We mentioned this point in our last article about Secure OS and, as promised, we return to it here. Continue reading
FEDERAL AUTHORITIES HAVE indicted four men on charges that they hacked into multiple financial institutions and operated a stock-pumping scheme and online gambling operations that netted them more than 100 million dollars.
We are happy to announce today that after several days of intense work, we have largely mitigated the DDoS attacks against us. These attacks took ProtonMail offline making it impossible to access emails, but did not breach our security. At present, attacks are continuing, but they are no longer capable of knocking ProtonMail offline for extended periods of time. Continue reading
For close to 10 months, a critical vulnerability in a library found in most Java rollouts has been twisting in the wind, unpatched, and until this week without proof-of-concept exploits that people paid attention to. Continue reading
What? The most underrated, underhyped vulnerability of 2015 has recently come to my attention, and I’m about to bring it to yours. No one gave it a fancy name, there were no press releases, nobody called Mandiant to come put out the fires. Continue reading