Category: Exploit Techniques

Tails from the Cri2p

In continuation of the previous blog Fairy Tails and Silver Bullets we present the technical details of the flaws found in I2P (Invisible Internet Project)

Read More

Silver Bullets and Fairy Tails

Introduction This week we made mention on Twitter of a zero-day vulnerability we’ve unearthed that affects the popular Tails operating system. As the Tails website

Read More