[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Lavabit and End-point Security
- To: cpunks <[email protected]>
- Subject: Lavabit and End-point Security
- From: [email protected] (coderman)
- Date: Fri, 30 Aug 2013 21:36:31 -0700
- In-reply-to: <CAJVRA1T5N=DF1zZpXZRsbaPFe069vyeR996CchGNVkKAwumnuw@mail.gmail.com>
- References: <20130809144310.GA29800@tuzo> <CAJVRA1T5N=DF1zZpXZRsbaPFe069vyeR996CchGNVkKAwumnuw@mail.gmail.com>
On Sun, Aug 11, 2013 at 2:27 AM, coderman <[email protected]> wrote:
> ...
> 4. rootkit and backdoor your own systems - use the dirty tricks to
> observe and constrain your system before someone else uses dirty
> tricks to compromise your system.
a good presentation which suggests this technique, among other useful ideas:
"Attack Driven Defense"
http://www.slideshare.net/zanelackey/attackdriven-defense