Lavabit and End-point Security

coderman coderman at gmail.com
Fri Aug 30 21:36:31 PDT 2013


On Sun, Aug 11, 2013 at 2:27 AM, coderman <coderman at gmail.com> wrote:
> ...
> 4. rootkit and backdoor your own systems - use the dirty tricks to
> observe and constrain your system before someone else uses dirty
> tricks to compromise your system.


a good presentation which suggests this technique, among other useful ideas:

"Attack Driven Defense"
http://www.slideshare.net/zanelackey/attackdriven-defense



More information about the cypherpunks mailing list