Category: all

  • Edison, Elephants, Subscription light switches, and Automation to reduce power usage

    Edison, Elephants, Subscription light switches, and Automation to reduce power usage

    So Thomas Edison. Yes he purposely electrocuted an elephant to make AC power look unsafe. But he was also an early pioneer in lightbulbs, most famously, the edison-type bulb. You probably have a bunch of A19/E26 bulbs kicking around your house, even if they have been converted to compact fluorescent or LED to reduce power.…

  • Tis the season for 3D cookie hackery

    Tis the season for 3D cookie hackery

    So you want to make gingerbread cookies, and you are missing the cutter? Options? Make rectangular or circular cookies? Drive to the store and spend a few $ on a cutter? How about using the 3D printer! Works a treat! $0.65 of filament.  

  • Assessing a country’s risk: Mirai/Satori, Argentina

    Mirai. It has done a ton of damage, attacking various routers and ip cameras etc. It was used to target Germany, so we know it can be used geographically. Now, it appears someone is working on getting another pool of Mirai ready to rock and roll. And they may be using a vulnerability in a…

  • What are we leaking? Maritime dangerous goods, korea, iot and mqtt

    What are we leaking? Maritime dangerous goods, korea, iot and mqtt

    There is a popular message protocol called MQTT. Its designed for lightweight M2M/IoT connectivity. I used it in my home to run my lights for example (using e.g. Sonoff-Tasmota and other devices I’ve built myself). It works really well to have devices self-register and report relatively high bandwidth sensor statistics. In fact, this is what…

  • Using shodan to fingerprint…. shodan

    So some people have devoted some effort to find the IP that shodan scans from. Various out of date lists like this one. Now, i’m dubious as to the rationale for this, it doesn’t make your vulnerability any lower, just makes it a bit harder for the lazy to find you. But, nonetheless, how would…