Tag Archive: rsa

Jun 30

Google eavesdropping tool installed on computers without permission | Technology | The Guardian

Privacy advocates claim always-listening component was involuntarily activated within Chromium, potentially exposing private conversations

Source: Google eavesdropping tool installed on computers without permission | Technology | The Guardian

Mar 24

DNS leak test

What is a DNS leak and why should I care?

When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network. If any traffic leaks outside of the secure connection to the network, any adversary monitoring your traffic will be able to log your activity.

DNS or the domain name system is used to translate domain names such as www.privacyinternational.org into numerical IP addresses e.g. which are required to route packets of data on the Internet. Whenever your computer needs to contact a server on the Internet, such as when you enter a URL into your browser, your computer contacts a DNS server and requests the IP address. Most Internet service providers assign their customers a DNS server which they control and use for logging and recording your Internet activities.

Under certain conditions, even when connected to the anonymity network, the operating system will continue to use its default DNS servers instead of the anonymous DNS servers assigned to your computer by the anonymity network. DNS leaks are a major privacy threat since the anonymity network may be providing a false sense of security while private data is leaking.

via DNS leak test.

Oct 27

AdNauseam – Clicking Ads So You Don’t Have To

As online advertising is becoming more automatic, universal and unsanctioned, AdNauseam works to complete the cycle by automating all ad-clicks universally and blindly on behalf of the target audience. Working in coordination with Ad Block Plus, AdNauseam quietly clicks every blocked ad, registering a visit on the ad networks databases. As the data gathered shows an omnivorous click-stream, user profiling, targeting and surveillance becomes futile.

via AdNauseam – Clicking Ads So You Don’t Have To.

Jul 02

Useful tool: USB dumper – CodingTeam

Tool that automatically dump the content of

USB devices plugged to your computer.

Currently, Universal Media Storage (USB sticks, MP3 players, etc…)

and MTP (Android 4.x phones, etc..) are supported.

New plugged devices are dumped automatically too.

via USB dumper – CodingTeam.

May 22

La Xbox One écoutera continuellement vos conversations

La Xbox One écoutera continuellement vos conversations.

May 06

Who Has Your Back? 2013 | Electronic Frontier Foundation

When you use the Internet, you entrust your conversations, thoughts, experiences, locations, photos, and more to companies like Google, AT&T and Facebook. But what do these companies do when the government demands your private information? Do they stand with you? Do they let you know what’s going on?

In this annual report, the Electronic Frontier Foundation examined the policies of major Internet companies — including ISPs, email providers, cloud storage providers, location-based services, blogging platforms, and social networking sites — to assess whether they publicly commit to standing with users when the government seeks access to user data. The purpose of this report is to incentivize companies to be transparent about how data flows to the government and encourage them to take a stand for user privacy whenever it is possible to do so.

We compiled the information in this report by examining each company’s published terms of service, privacy policy, transparency report, and guidelines for law enforcement requests, if any. We also considered the company’s public record of fighting for user privacy in the courts and whether it is a member of the Digital Due Process coalition, which encourages Congress to improve outdated communications law. Finally, we contacted each company to explain our findings and gave them an opportunity to provide evidence of improved policies and practices. These categories are not the only ways that a company can stand up for users, of course, but they are important and publicly verifiable. In addition, not every company has faced a decision about whether to stand up for users in the courts, but we wanted to particularly commend those companies who have done so when given with the opportunity.


Who Has Your Back? 2013 | Electronic Frontier Foundation.

Feb 16

The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing


Paper Submission Deadline: March 18, 2013

The 2013 World Congress in Computer Science,
Computer Engineering, and Applied Computing
July 22-25, 2013, Las Vegas, USA


You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. In addition, like prior years, extended versions of selected
papers (about 35%) will appear in journals and edited research books
(publishers include: Springer, Elsevier, BMC, and others). See the
following links for a small subset of the publications based on this

In addition to the above, we have arranged two new book series; one with
Elsevier publishers (Transactions on Computer Science and Applied Computing)
and another with Springer publishers (Transactions of Computational Science
and Computational Intelligence). After the conference, a significant number
of authors of accepted papers of our congress, will be given the
opportunity to submit the extended version of their papers for publication
in these books. The web sites for the two book series will be made
available after the logistics are finalized between our committee and the
publishers (both book series projects have been approved.) We anticipate
having between 10 to 20 books a year in each of these book series projects.
Each book in each series will be subject to Elsevier and Springer science
indexing products (which includes: Scopus, Ei village, SCI, …).

The Congress is composed of a number of tracks (joint-conferences,
tutorials, sessions, workshops, poster and panel discussions); all will
be held simultaneously, same location and dates: July 22-25, 2013. For
the complete list of joint conferences, see below.


March 18, 2013: Submission of full papers (about 7 pages)
April 18, 2013: Notification of acceptance (+/- two days)
May 5, 2013: Final papers + Copyright + Registration
July 22-25, 2013: The 2013 World Congress in Computer Science,
Computer Engineering, and Applied Computing
(including all affiliated conferences).


Currently being prepared – The Academic Sponsors of the last offering of
the congress (2012) included research labs and centers affiliated with:
Minnesota Supercomputing Institute, USA; Argonne National Laboratory,
Illinois, USA; George Mason University, Virginia, USA; Harvard University,
Cambridge, Massachusetts, USA; Center for Cyber Defense, NCAT, North
Carolina, USA; Center for Advanced Studies in Identity Sciences (CASIS:
NC A&T, Carnegie Mellon, Clemson, UNC Wilmington), USA; Massachusetts
Institute of Technology (MIT), Cambridge, Massachusetts, USA; Texas A&M
University, USA; UMIT, Institute of Bioinformatics and Translational
Research, Austria; University of Iowa, USA; Russian Academy of Sciences,
Moscow, Russia; NDSU-CIIT Green Computing and Communications Laboratory,
USA; Medical Image HPC and Informatics Lab, Iowa, USA; and others.
Sponsors At-Large included (corporate, associations, organizations):
Intel Corporation; Super Micro Computer, Inc., California, USA; Altera
Corporation; The International Council on Medical and Care Compunetics;
International Society of Intelligent Biological Medicine; US Chapter of
World Academy of Science; High Performance Computing for Nanotechnology;
Luna Innovations; World Academy of Biomedical Sciences and Technologies;
Manx Telecom; Computer Science Research, Education, and Applications
Press; HoIP Telecom; Hodges Health; Leading Knowledge; OMG; Science
Publications and others.


Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at: http://world-comp.org . Submissions must
be uploaded by March 18, 2013 and must be in either MS doc or pdf
formats (about 7 pages including all figures, tables, and references –
single space, font size of 10 to 12). All reasonable typesetting formats
are acceptable (later, the authors of accepted papers will be asked to
follow a particular typesetting format to prepare their final papers for
publication.) Papers must not have been previously published or currently
submitted for publication elsewhere. The first page of the paper should
include: title of the paper, name, affiliation, postal address, and email
address for each author. The first page should also identify the name of
the Contact Author and a maximum of 5 topical keywords that would best
represent the content of the paper. The name of the conference that the
paper is being submitted for consideration must also be stated on the
first page of the paper as well as a 100 to 150-word abstract. The length
of the final/Camera-Ready papers (if accepted) will be limited to 7
(two-column IEEE style) pages.

Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees. Papers
whose authors include a member of the conference program committee will
be evaluated using the double-blinded review process. (Essay/philosophical
papers will not be refereed but may be considered for discussion/panels).

The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper. Science citation databases include: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (accessable from INIST,
Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, & STN International);
P3P8PCTD70148 and others. Though, there is no guarantee that the
proceedings will also be included in SCI EI Compendex/Elsevier indexings;
in the past, the proceedings were included in these databases. Therefore,
we will also be sending the proceedings for indexing procedures to SCI EI
Compendex/ Elsevier. The printed proceedings/books will be available for
distribution on site at the conference.

In addition to the above, we have arranged two new book series; one with
Elsevier publishers (Transactions on Computer Science and Applied Computing)
and another with Springer publishers (Transactions of Computational Science
and Computational Intelligence). After the conference, a significant number
of authors of accepted papers of our congress, will be given the
opportunity to submit the extended version of their papers for publication
in these books. We anticipate having between 10 to 20 books a year in each
of these book series projects. Each book in each series will be subject to
Elsevier and Springer science indexing products (which includes: Scopus,
Ei village, SCI, …).


Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for the submission is limited to 2 pages. On the first page, the author
should state that “This paper is being submitted as a poster”. Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so.

LIST OF CONFERENCES (alphabetical order based on conference acronym)

The 14th International Conference on Bioinformatics & Computational

o CDES’13:
The 13th International Conference on Computer Design

o CGVR’13:
The 17th International Conference on Computer Graphics & Virtual

o CSC’13:
The 10th International Conference on Scientific Computing

o DMIN’13:
The 9th International Conference on Data Mining

o EEE’13:
The 12th International Conference on e-Learning, e-Business,
Enterprise Information Systems, and e-Government

o ERSA’13:
The 13th International Conference on Engineering of Reconfigurable
Systems and Algorithms

o ESA’13:
The 11th International Conference on Embedded Systems and

o FCS’13:
The 9th International Conference on Foundations of Computer Science

o FECS’13:
The 9th International Conference on Frontiers in Education: Computer
Science and Computer Engineering

o GCA’13:
The 9th International Conference on Grid & Cloud Computing and

o GEM’13:
The 10th International Conference on Genetic & Evolutionary Methods

o ICAI’13:
The 15th International Conference on Artificial Intelligence

o ICOMP’13:
The 14th International Conference on Internet Computing and Big Data

o ICWN’13:
The 12th International Conference on Wireless Networks

o IKE’13:
The 12th International Conference on Information & Knowledge Engineering

o IPCV’13:
The 17th International Conference on Image Processing, Computer Vision,
& Pattern Recognition

o MSV’13:
The 10th International Conference on Modeling, Simulation and
Visualization Methods

o PDPTA’13:
The 19th International Conference on Parallel and Distributed
Processing Techniques and Applications

o SAM’13:
The 12th International Conference on Security and Management

o SERP’13:
The 11th International Conference on Software Engineering Research
and Practice

o SWWS’13:
The 12th International Conference on Semantic Web and Web Services

July 22-25, 2013, Las Vegas, USA.

All conferences listed above will be held simultaneously; ie, same location
and dates.


Currently being finalized. The members of the Steering Committee of
The 2012 congress included: Dr. Selim Aissi, (formerly: Chief
Strategist – Security, Intel Corporation, USA) Senior Business Leader &
Chief Architect, Visa Corporation, USA; Prof. Babak Akhgar, PhD, FBCS,
CITP, Professor of Informatics, Sheffield Hallam University, Sheffield,
UK; Prof. Hamid R. Arabnia, Professor of Computer Science, Elected
Fellow of ISIBM, Editor-in-Chief of Journal of Supercomputing (Springer),
University of Georgia, USA; Prof. Kevin Daimi, Professor of Computer
Science, Director of Computer Science and Software Engineering Programs,
Department of Mathematics, Computer Science and Software Engineering,
University of Detroit Mercy, Detroit, Michigan, USA; Prof. Gerry Vernon
Dozier, Professor of Computer Science, Chair of Department of Computer
Science and Director of Center for Advanced Studies in Identity Sciences,
Center for Cyber Defense, North Carolina A&T State University, NC, USA;
Dr. Michael R. Grimaila, Associate Professor, Air Force Institute of
Technology, Systems Engineering, Fellow of ISSA, CISM, CISSP, IAM/IEM,
Editorial Board of ISSA Journal, Air Force Center of Cyberspace Research,
Advisor to the Prince of Wales Fellows & Prince Edward Fellows at MIT and
Harvard Universities and PC member of NATO Cooperative Cyber Defence
Centre of Excellence (CCD COE); Prof. Kun Chang Lee, Professor of MIS and
WCU Professor of Creativity Science, Business School and Department of
Interaction Science, Sungkyunkwan University, Seoul, South Korea; Prof.,
Dr., Dr.h. Victor Malyshkin, Head of Supercomputer Software Department
(SSD), Institute of Computational Mathematics and Mathematical Geophysics,
Russian Academy of Sciences, Russia; Prof. George Markowsky, Professor and
Chair of Computer Science, Associate Director of School of Computing and
Information Science, Chair of International Advisory Board of IEEE IDAACS
and Director 2013 Northeast Collegiate Cyber Defense Competition, Chair
Bangor Foreign Policy Forum, Cooperating Professor of Mathematics &
Statistics Department UMaine, Cooperating Professor of School of Policy &
International Affairs UMaine, University of Maine, Orono, Maine, USA;
Prof. Andy Marsh, Director of HoIP, Director of HoIP Telecom, UK,
Secretary-General of WABT, Vice-president of ICET, Visiting Professor,
University of Westminster, UK; Prof. James J. (Jong Hyuk) Park, Professor
of Computer Science and Engineering, Seoul National University of Science
and Technology (SeoulTech), Korea, President of KITCS, Presidentof FTRA,
Editor-in-Chiefs of HCIS, JoC and IJITCC Journals; Ashu M. G. Solo
(Publicity Chair), Fellow of British Computer Society, Principal R&D
Engineer, Maverick Technologies America; Prof. Sang C. Suh, Head and
Professor of Computer Science, Vice President, of Society for Design and
Process Science (SDPS), Director of Intelligent Cyberspace Engineering
Lab (ICEL), Texas A&M University, Com., Texas, USA; Prof. Layne T. Watson,
IEEE Fellow, NIA Fellow, ISIBM Fellow, Fellow of The National Institute
of Aerospace, Virginia Polytechnic Institute & State University, Virginia,

The 2013 Program Committee for individual conferences are currently being
compiled. Many who have already joined the committees are renowned leaders,
scholars, researchers, scientists and practitioners of the highest ranks;
many are directors of research labs., fellows of various societies, heads/
chairs of departments, program directors of research funding agencies, as
well as deans and provosts.

Program Committee members are expected to have established a strong and
documented research track record. Those interested in joining the Program
Committee should email editor@world-comp.org the following information
for consideration/evaluation: Name, affiliation and position, complete
mailing address, email address, a one-page biography that includes
research expertise & the name of the conference(s) offering to help with.


The Congress will be composed of research presentations, keynote
lectures, invited presentations, tutorials, panel discussions, and
poster presentations. In recent past, keynote/tutorial/panel speakers
have included: Prof. David A. Patterson (pioneer, architecture, U. of
California, Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology), Prof. John H. Holland (known as Father of Genetic
Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), Prof. Haym Hirsh (Rutgers University, New Jersey, USA
and former director of Division of Information and Intelligent Systems,
National Science Foundation, USA), Dr. Flavio Villanustre (Vice-
President, HPCC Systems), and many other distinguished speakers. To
get a feeling about the conferences’ atmosphere, see the 2012
delegates photos available at:

An important mission of The Congress is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines.


As of December 2012, papers published in the conference proceedings that
are currently being held as part of WORLDCOMP, have received over 27,000
citations (includes about 2,000 self-citations). Citation data obtained
from http://academic.research.microsoft.com/ .


Inquiries should be sent to: sc@world-comp.org


Feb 01

US Government: disable Universal Plug and Play on routers due to hacker threat

US Government: disable Universal Plug and Play on routers due to hacker threat.

Jan 07

SkypeHide – Un outil pour transmettre des données en douce lors d’une conversation Skype | Korben

SkypeHide – Un outil pour transmettre des données en douce lors d’une conversation Skype | Korben.

Jul 02

CANS 2012 – The 11th International Conference on Cryptology and Network Security

CANS 2012 – The 11th International Conference on Cryptology and Network Security
Darmstadt, Germany, December 12-14, 2012


The International Conference on Cryptology and Network Security (CANS) is a
recognized annual conference, focusing on all aspects of cryptology and
network security, attracting cutting-edge results from world-renowned
scientists in the area.

Original research papers on all technical aspects of cryptology and network
security are solicited for submission to CANS 2012. Papers suggesting novel
paradigms, original directions, or non-traditional perspectives are
especially welcome.

Topics of Interest

– Access Control
– Anonymity
– Authentication, Identification
– Biometrics
– Block and Stream Ciphers
– Cloud Security
– Cryptographic Algorithms, Protocols
– Denial of Service
– Embedded Platform Security
– Hash Functions
– (Future) Internet Security
– Key Management
– Network Security
– Peer-to-Peer Security
– Identity and Trust Management
– Public-key Cryptography
– Secure Hardware
– Security Modeling and Architectures
– Spyware Analysis and Detection
– Wireless and Mobile Security

Important Dates
Submission deadline: July 15, 2012, 11:00 UTC
Notification of acceptance: September 8, 2012
Camera-ready deadline: September 15, 2012
Conference:  December 12-14, 2012


General chair:
– Mark Manulis, University of Surrey, UK

Program chairs:
– Josef Pieprzyk, Macquarie University, Australia
– Ahmad-Reza Sadeghi, Technische Universität Darmstadt / Fraunhofer SIT,

Program committee:
– Michel Abdalla, ENS, France
– Gildas Avoine, Université catholique de Louvain, Belgium
– Feng Bao, Institute for Infocomm Research, Singapore
– Sébastien Canard, Orange Labs, France
– Sherman Chow, University of Waterloo, Canada
– Nicolas Courtois, University College London, UK
– Emiliano De Cristofaro, PARC Research, USA
– Reza Curtmola, New Jersey Institute of Technology, USA
– George Danezis, Microsoft Research Cambridge, United Kingdom
– Roberto Di Pietro, Università di Roma Tre, Italy
– Juan Garay, AT&T Labs Research, USA
– Philip Hawkes, Qualcomm, Australia
– Amir Herzberg, Bar-Ilan University, Israel
– Nick Hopper, University of Minnesota, USA
– Stanislaw Jarecki, University of California, Irvine, USA
– Xuxian Jiang, North Carolina State University, USA
– Seny Kamara, Microsoft Research, USA
– Angelos Keromytis, Columbia University, USA
– Svein Johan Knapskog, NTNU – Trondheim, Norway
– Benoit Libert, Université Catholique de Louvain, Belgium
– Atsuko Miyaji, JAIST, Japan
– Refik Molva, Eurecom, France
– Fabian Monrose, University of North Carolina, USA
– David Naccache, Ecole Normale Supérieure, France
– Michael Nährig, Eindhoven University of Technology, Netherlands
– Eiji Okamoto, University of Tsubuka, Japan
– Claudio Orlandi, Bar-Ilan University, Israel
– Jacques Patarin, Universite de Versailles, France
– Raphael C.-W. Phan, Loughborough University, UK
– Bart Preneel, Katholieke Universiteit Leuven, Belgium
– Vincent Rijmen, TU Graz, Austria
– Matt Robshaw, Orange Labs, France
– Rei Safavi-Naini, University of Calgary, Canada
– Thomas Schneider, TU Darmstadt, Germany
– Elaine Shi (Rungting), UC Berkeley, USA
– Francois-Xavier Standaert, University catholique de Louvain, Belgium
– Douglas Stebila, Queensland University of Technology, Australia
– Ron Steinfeld, Macquarie University, Australia
– Willy Susilo, University of Wollongong, Australia
– Markus Ullmann, Federal Office for Information Security (BSI), Germany
– Ersin Uzun, PARC Research, USA
– Frederik Vercauteren, Katholieke Universiteit Leuven, Belgium
– Huaxiong Wang, Nanyang Technological University, Singapore
– Michael J. Wiener, Irdeto, Canada
– Xinwen Zhang, Huawei Research Center, USA

Local arrangements committee:
– Stanislav Bulygin, Technische Universität Darmstadt, Germany

Steering committee:
– Yvo Desmedt (Chair), University College London, UK
– Matt Franklin, University of California, Davis, USA
– Juan A. Garay, AT&T Labs – Research, USA
– Yi Mu, University of Wollongong, Australia
– David Pointcheval, CNRS and ENS Paris, France
– Huaxiong Wang, Nanyang Technological University, Singapore

Older posts «