Skip to content


Posts by: Davi Ottenheimer

  1. Impostors in Your Call Center April 16, 2015

    Posted in Security.

    No comments
  2. Keeping Car Contents Safe From Electronic Key Thieves April 15, 2015

    Posted in Security.

    1 comment
  3. SailPi: Install Sailfish OS on Raspberry Pi 2 March 30, 2015

    Posted in Security.

    1 comment
  4. Antenna: Computer Viruses and Hacking (BBC 1989) March 6, 2015

    Posted in History, Security.

    No comments
  5. SuperFish Exploit: Kali on Raspberry Pi 2 February 21, 2015

    Posted in Security.

    1 comment
  6. Cyberwar revisionism: 2008 BTC pipeline explosion February 16, 2015

    Posted in Energy, History, Security.

    No comments
  7. Eventually Navies Take Over February 11, 2015

    Posted in History, Sailing, Security.

    No comments
  8. Samsung TV: Would You Trust It? February 10, 2015

    Posted in Security.

    No comments
  9. The DPRK Humanitarian Crisis February 9, 2015

    Posted in Security.

    No comments
  10. A Remote Threat: The White House Drone Incident February 6, 2015

    Posted in Security.

    No comments
  11. Beware the Sony Errorists February 3, 2015

    Posted in Security.

    No comments
  12. Gov Fumbles Over-Inflated Sony Hack Attribution Ball January 24, 2015

    Posted in History, Security.

    1 comment
  13. Was Stuxnet the “First”? January 21, 2015

    Posted in Energy, History, Security.

    No comments
  14. Movie Review: JSA (Joint Security Area) January 18, 2015

    Posted in Security.

    No comments
  15. A Political Science TL;DR for InfoSec January 14, 2015

    Posted in Security.

    No comments
  16. The Beginning Wasn’t Full-Disclosure January 12, 2015

    Posted in History, Security.

    No comments
  17. US President Calls for Federal 30-day Breach Notice January 12, 2015

    Posted in History, Security.

    1 comment
  18. The (Secret) History of the Banana Split January 3, 2015

    Posted in Food, History, Security.

    No comments
  19. Linguistics as a Tool for Cyber Attack Attribution December 27, 2014

    Posted in Security.

    No comments
  20. How the NSA Can Tell if You Are a Foreigner July 7, 2014

    Posted in History, Security.

    No comments
  21. In Defense of Microsoft’s Active Defense Against No-IP July 4, 2014

    Posted in Security.

    No comments
  22. 2014 Things Expo: New Security Models for the Internet of Things June 25, 2014

    Posted in Security.

    No comments
  23. Cyber-Colonialism and Beliefs About Global Development June 22, 2014

    Posted in History, Security.

    No comments
  24. US Wants to Help Africa on the Rise May 11, 2014

    Posted in Energy, History, Security.

    No comments
  25. 2014 Österreich Stammtisch: The UnCERTainty of Attribution April 26, 2014

    Posted in Security.

    No comments