Lavabit and End-point Security
coderman
coderman at gmail.com
Fri Aug 30 21:36:31 PDT 2013
On Sun, Aug 11, 2013 at 2:27 AM, coderman <coderman at gmail.com> wrote:
> ...
> 4. rootkit and backdoor your own systems - use the dirty tricks to
> observe and constrain your system before someone else uses dirty
> tricks to compromise your system.
a good presentation which suggests this technique, among other useful ideas:
"Attack Driven Defense"
http://www.slideshare.net/zanelackey/attackdriven-defense
More information about the cypherpunks
mailing list