Offensive Security Team

Forums Personal Topics Unbidden Thoughts Offensive Security Team

This topic contains 3 replies, has 1 voice, and was last updated by  josh March 18, 2021 at 2:18 am.

  • Author
    Posts
  • #86934

    josh

    Helpful also to focus on how the Good Team context creates new problems & opportunities for research & design:

    Similar: Desire to detect, understand, & mitigate security problems in networks, systems, & hardware that the team is creating or using.

    Different:
    No need to hide offensive techniques that the state/Heine wants to keep using in secret. We want to expose those techniques.

    No political sensitivity about creating biometric indicators of same/different which actually work & serve the design purpose.

    Focus on actual threats caused by corruption in std. systems such as SSL certificates, package shipments, spyware & attackware in basic off-the-shelf materials, electronic hijacking of vehicles, etc.

    Dealing with person replacement as a common/ubiquitous threat.

    Reality of local eavesdropping (i.e. there is no privacy of your own residence).

  • #87008

    josh

    Topic for Discussion: Are there potential advantages to auditing installed binaries/scripts & hardware using UEFI programs in a special boot/audit mode?

  • #87010

    josh

You must be logged in to reply to this topic.