KALYPTO (IN)SECURITY

Research, demonstrations, and popcorn

Respect, a note to you all…

With the passing of someone we know, it makes us re-evaluate life, think about death, and contemplate the things we want to say to people before we die.  The passing of Blitzkrieg has done just that, so I want to let some of you know that I respect you even if we don’t talk much. …

Continue Reading

Update on Buffalo Wild Wings

Note: Just in case they get an attitude, the image above is satirical and in no way represents the views, ideas, or promotion of my blog by the Buffalo Wild Wings company.  Well… someone else will have to let me know if they ever fix the security hole in their wifi/kiosks.  Buffalo Wild Wings officially…

Continue Reading

Proposed Limitations and Changes to the U.S. Government

Congressional Term Limits: There are no limitations to the length of time a congress person may hold office.  This means that a single person may hold political power for their lifetime.  In the case of a senator, that length is in six year increments.  For a representative, that term is in two year increments. Congressional members should be allowed…

Continue Reading

Finding an IP Behind a Reverse Proxy: How to look like a fool and influence people…

I have posted before about checking a specific IP for a website.  I wanted to go a little more into detail on how to use it and how to know when you are getting a false positive. There are a few ways you can query a specific IP for a website.  You can use DNS…

Continue Reading

Kim Dotcom, Sovereignty, and Taxes

For those that do not know who Kim Dotcom is… Kim Dotcom (yes, that is his legal name now) was a founder of MegaUpload.  The site was used for a variety of file sharing needs; everything from sharing source code of open source software, to pirated movies.  He is currently facing extradition in New Zealand. …

Continue Reading

Paris, ISIL, and Anonymous

On Friday a group of radical Islamists attacked Paris.  This was a very low-tech, high-coordination attack.  The group attacked six locations simultaneously and killed over 120 people.  I can’t give an exact number because everywhere you look, you will see different numbers.  You will also see those numbers increase as some of the critical condition…

Continue Reading

Buffalo Wild Wings Kiosks

Note: I left some information out of this post because Buffalo Wild Wings has not closed the security hole.  They also did not even bother responding to me when I attempted to contact them MANY times.  I explained the dangers of not responding and closing the security hole, but as of today, I have yet…

Continue Reading

TRAFFICCAM – Watching the world…

Note:  The following is all hypothetical and in no way is a representation of what is currently in use, was in use in the past, or will be in use in the future. Imagine you have a video camera.  Imagine that camera is not only a single point of view camera, but can actually take…

Continue Reading

Windows 10 Privacy Advocate – Released on GitHub

Windows 10 Privacy Advocate has been released as an open-source project on GitHub.  The project aims to allow Windows 10 users to take back some of their privacy. With the release of Windows 10, many new forms of tracking have been included.  Everything from tracking what sites you visit, how many times you visit them,…

Continue Reading

Hacking Chili’s ZIOSKs (Not just Chili’s)

Background: In 2013 Chili’s and Applebee’s started installing ZIOSK tablets at all of their restaurants.  These tablets allow patrons to order, request drink re-fills, view the menu, view websites, and pay the bill.  These little tablets are a good way to give patrons a little more control over their end-of-dinner timing and get out of the…

Continue Reading

1 2 3 4 5