Alphabetical Index
Alphabetical Index
All technologies mentioned in “Attack Surface” sorted alphabetically for quick reference.
A
Advanced Persistent Threat
An advanced persistent threat (APT) is a stealthy threat actor,
typically a nation state or state-sponsored group, which gains unauthorized access
to a computer network and remains undetected for an extended period.
Learn more:
Adversarial perturbation
An “adversarial perturbation” is a change to a physical object that is deliberately designed to fool a machine-learning system into mistaking it for something else. (from an article written by Cory Doctorow)
Learn more:
- https://boingboing.net/2017/08/07/nam-shub-of-enki.html
- https://boingboing.net/2017/03/29/countermeasures-are-a-thing.html
- https://arxiv.org/pdf/1707.08945.pdf
- https://arxiv.org/abs/2005.08087
Am I under arrest?
This and the following questions are part of the recommended procedure when interacting with police.
Learn more:
- https://www.halt.org/am-i-being-detained-6-questions-you-should-ask-during-interactions-with-the-police/
- https://www.browarddefender.org/page3.html
- https://www.aclu.org/know-your-rights/stopped-by-police/
Android Developer’s mode
Masha uses USB to connect Tanisha’s phone to her laptop and manipulate software on her phone.
She uses Android Developer’s mode and USB debugging for that. More:
- https://developer.android.com/studio/debug/dev-options
- https://www.makeuseof.com/tag/what-is-usb-debugging-mode-on-android-makeuseof-explains/
- https://developers.google.com/web/tools/chrome-devtools/remote-debugging
Android rootkit
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software. Rootkits exist for different operating systems, including Android. Masha just discovered a rootkit on Tanisha’s phone.
Learn more:
- https://en.wikipedia.org/wiki/Rootkit
- http://www.cs.tufts.edu/comp/116/archive/fall2013/azakaria.pdf
- https://arstechnica.com/information-technology/2016/11/powerful-backdoorrootkit-found-preinstalled-on-3-million-android-phones/
- https://www.androidpolice.com/2020/04/19/months-of-research-finally-crack-android-malware-that-could-even-survive-factory-resets/
Anonymouth
Document anonymization tool written in Java. More:
Anti-Stingray
Tools to protect oneself from IMSI-catchers.
Learn more:
- https://privacysos.org/blog/how-to-defeat-fbi-or-police-stingray-surveillance/
- https://www.firstpoint-mg.com/blog/top-7-imsi-catcher-detection-solutions-2020/
- https://en.wikipedia.org/wiki/Stingray_phone_tracker
- https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/
ARGs (Alternate Reality Games)
Interactive games that are usually played in real world mixed with multimedia and online services. Usually they use stories that are created and controlled by game designers.
Learn more:
- https://en.wikipedia.org/wiki/Alternate_reality_game
- https://en.wikipedia.org/wiki/List_of_alternate_reality_games
- https://www.argn.com/
Asterisk
An open source phone framework that can be used to build a Voice-over-IP or IP PBX system.
Masha runs such a server on the cloud and uses it to route her calls.
One of the examples: https://aws.amazon.com/marketplace/pp/Technology-Innovation-Lab-of-Texas-Asterisk-1770-A/B079Y7449R
Learn more:
- https://www.asterisk.org/
- https://en.wikipedia.org/wiki/Asterisk_(
PBX)) - https://www.voip-info.org/asterisk/
- https://techexpert.tips/asterisk/asterisk-installation-cloud-aws-ec2/ (tutorial)
B
Backdoor
A hidden method to access a computer or network device bypassing the normal authentication scheme, usually created as a part of the software running on that computer.
Learn more:
Bad spelling in check-in messages
Obviously Masha still uses an old, centralized version control system like Subversion, and not more modern, decentralized Git.
Learn more:
BadUSB
It is a way to use the microcontroller embedded in a USB device to inject malware in your computer.
The most dangerous thing about it is that all the work is done by that microcontroller,
invisible to the target computer’s CPU.
Learn more:
- https://opensource.srlabs.de/projects/badusb
- https://hackaday.com/2014/10/05/badusb-means-were-all-screwed/ (there are links to the paper and video explaining how it works)
- https://srlabs.de/wp-content/uploads/2014/11/SRLabs-BadUSB-Pacsec-v2.pdf
Baseband phone security
It was confirmed that the software that controls the baseband radio on smartphones can be compromised and can allow attackers to control other smartphone devices such as camera and microphone. More (some papers are a bit dated, but it’s quite possible some vulnerabilities described in them still exist):
- https://techcrunch.com/2019/11/08/android-baseband-flaws/
- https://www.ccdcoe.org/uploads/2018/10/Art-16-Attacking-the-Baseband-Modem-of-Breach-the-Users-Privacy-and-Network-Security.pdf (2015)
- https://smartech.gatech.edu/bitstream/handle/1853/43766/davis_andrew_t_201205_ro.pdf (2012)
Battlefield intelligence
Is described in the US Army document “Intelligence Preparation of the Battlefield”. More:
Bayesian inference
A method of statistical inference in which Bayes’ theorem is used to update the probability for a hypothesis as more evidence or information becomes available.
Learn more:
- https://en.wikipedia.org/wiki/Bayesian_inference
- https://en.wikipedia.org/wiki/Bayes%27_theorem
- https://seeing-theory.brown.edu/bayesian-inference/index.html (interactive, with pictures)
- https://towardsdatascience.com/probability-concepts-explained-bayesian-inference-for-parameter-estimation-90e8930e5348
Binary Transparency
A method that allows users to verify that the piece of software they use is exactly the same used by other users, i.e. it was not substituted by a compromised version.
Learn more:
- https://wiki.mozilla.org/Security/Binary_Transparency
- Contour - a practical system for binary transparency: https://smeiklej.com/files/cbt18.pdf
- http://diyhpl.us/wiki/transcripts/building-on-bitcoin/2018/binary-transparency/
- https://github.com/BrandonTang/binary-transparency
Blinkenlights
Usually refers to the diagnostic lights on computer’s front panels (in the old days). The term derives from the famous text dated as far back as 1955. +
ACHTUNG!
ALLES TURISTEN UND NONTEKNISCHEN LOOKENSPEEPERS!
DAS KOMPUTERMASCHINE IST NICHT FÜR DER GEFINGERPOKEN UND MITTENGRABEN! ODERWISE IST EASY TO SCHNAPPEN DER SPRINGENWERK, BLOWENFUSEN UND POPPENCORKEN `MIT` SPITZENSPARKEN.
IST NICHT FÜR GEWERKEN BEI DUMMKOPFEN. DER RUBBERNECKEN SIGHTSEEREN KEEPEN DAS COTTONPICKEN HÄNDER IN DAS POCKETS MUSS.
ZO RELAXEN UND WATSCHEN DER BLINKENLICHTEN.Learn more:
Blogger
A blogging platform owned by Google. Created in 1999 by Pyra Labs. Written in Python.
Learn more:
Bootloader
A piece of software which normally starts at the early stages of computer start-up process,
after executing the BIOS, but before the operating system starts.
Its purpose is to load the operating system (hence the name).
Bootloader integrity check is important to avoid a “boot attack”:
type of attack that replaces the original bootloader and installs a bootloader
that can intercept passwords, including those used for hard drive encryption.
Learn more:
- https://link.springer.com/chapter/10.1007/978-1-4302-6572-6_6 (very good explanation; you can read a chapter, or download the whole book there – thanks, Springer!)
- https://en.wikipedia.org/wiki/Booting#Modern_boot_loaders
- https://engineering.fb.com/2016/01/29/security/hardware-and-firmware-attacks-defending-detecting-and-responding/
- Evil maid attack: https://en.wikipedia.org/wiki/Evil_maid_attack
- https://onlinelibrary.wiley.com/doi/full/10.1002/eng2.12032
BusyBox
A lightweight software suite with a set of Linux/Unix commands that is used in embedded devices (list: https://busybox.net/products.html). Can be downloaded and executed as a single binary (size ~1 MB).
Learn more:
BusyBox malware
Masha explains it pretty well: there are pieces of malware that can be executed on systems running BusyBox.
Learn more:
- https://www.csoonline.com/article/2848606/bash-malware-targets-embedded-devices-running-busybox.html
- https://www.trendmicro.com/vinfo/us/threat-encyclopedia/search/busybox
- https://www.incibe-cert.es/en/blog/attacking-busybox-small-gaulish-village
- https://en.wikipedia.org/wiki/BASHLITE
C
CALEA
A wiretapping bill, passed in 1994, as Masha explains it. More:
- https://www.fcc.gov/public-safety-and-homeland-security/policy-and-licensing-division/general/communications-assistance
- https://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act
Caller ID spoofing
A method or tool that allows the caller to pretend that the call is coming from a different number.
Masha uses it to read friends’ voicemails pretending she is calling from their numbers.
Scammers use this method to pretend they are calling from the same area code – that way
there is more chances that you pick the call.
Sometimes scammers even pretend they are calling from the actual 800-number which belongs to IRS.
Learn more:
- https://en.wikipedia.org/wiki/Caller_ID_spoofing
- https://www.fcc.gov/consumers/guides/spoofing-and-caller-id
- https://blog.rapid7.com/2018/05/24/how-to-build-your-own-caller-id-spoofer-part-1/
Catching password from key sounds
Different keys on the keyboard produce slightly different sounds so the recorded acoustic pattern of you typing in your password can be used to guess it. That’s why Masha does ““medium-loud AAAAAH”” when typing her password.
Learn more:
- https://security.stackexchange.com/questions/23322/keyboard-sniffing-through-audio-recorded-typing-patterns
- https://www.davidsalomon.name/CompSec/auxiliary/KybdEmanation.pdf
- https://en.wikipedia.org/wiki/Keystroke_logging
Citizen Lab
A laboratory based at University of Toronto which works on protecting human rights and privacy in cyberspace.
Learn more:
COINTELPRO
COINTELPRO (syllabic abbreviation derived from COunter INTELligence PROgram)
(1956–present) is a series of covert and illegal projects conducted by the
United States Federal Bureau of Investigation (FBI) aimed at
surveilling, infiltrating, discrediting, and disrupting American political
organizations.
Learn more:
- https://en.wikipedia.org/wiki/`COINTELPRO`
- https://vault.fbi.gov/cointel-pro
- https://www.intelligence.senate.gov/sites/default/files/94755_II.pdf
- https://www.freedomarchives.org/Documents/Finder/Black%20Liberation%20Disk/Black%20Power!/SugahData/Government/`COINTELPRO`.S.pdf
- https://www.krusch.com/books/kennedy/Cointelpro_Papers.pdf
CV dazzle
A type of camouflage used to hamper facial recognition software, inspired by dazzle camouflage used by warships.
Learn more:
- https://en.wikipedia.org/wiki/Computer_vision_dazzle https://en.wikipedia.org/wiki/Dazzle_camouflage
- https://cvdazzle.com/
D
Data-collecting light bulbs
Most likely Masha means this report: https://darkcubed.com/iot-security-technical. Short versions:
- https://blog.adafruit.com/2019/03/10/is-your-smart-bulb-collecting-data-iot-smartdevice/
- https://www.cnet.com/news/smart-light bulbs-could-be-exporting-your-personal-data-to-china/
Dazzle mask
A mask that allows you to trick facial-recognition software into thinking you are not human. They may use reflective tapes, infrared lights, lenses, etc.
Learn more:
- https://www.businessinsider.com/clothes-accessories-that-outsmart-facial-recognition-tech-2019-10
- https://www.reflectacles.com/#home
E
`EFF’s Surveillance Self-Defense Kit
Surveillance Self-Defense is a digital security guide that teaches you how to assess your personal risk from online spying. It can help protect you from surveillance by those who might want to find out your secrets, from petty criminals to nation states.
Learn more:
EL wire
Electroluminescent wire is a thin copper wire coated in a phosphor that produces light through electroluminescence when an alternating current is applied to it. More:
Enigmail
In the email header from Kriztina there is a phrase: +
Enigmail UNTRUSTED good signature from Kriztina kriztinak@riseup.net
That means she uses Enigmail to encrypt and digitally sign her messages. Enigmail works with several mail clients including Thunderbird and Evolution. The meaning of “Untrusted good signature” was explained on the Enigmail forum: +
GOOD means that Enigmail verified that the mail content matches the signature. Nobody tampered with the message. It reached you unmodified and only the ones that have the SECRET key it is signed with are able to perform that particular signature. UNTRUSTED means that although the message matches the signature, GnuPG cannot check whether the key belongs to the OWNER of the email address.
Learn more:
Everything after the slash
Masha says: “I itched to get their Google searches, but that was hard because
Google had better security than every other service they visited – strong SSL
certificates that hid everything after the slash,
so all I could see from my vantage point was https://google.com/ – and then…
nothing.”
+
This happens when you visit sites that use HTTPS (secure HTTP) and hence,
use SSL/TLS certificates.
Even if somebody (in this case Masha) intercepts the traffic between you and
your provider, they will see only the domain name of the server you are accessing.
Everything else in your URL (search queries, usernames, etc.) will be hidden.
+
Learn more:
- https://security.stackexchange.com/questions/7705/does-ssl-tls-https-hide-the-urls-being-accessed
- https://security.stackexchange.com/questions/4388/are-urls-viewed-during-https-transactions-to-one-or-more-websites-from-a-single
- https://stackoverflow.com/questions/499591/are-https-urls-encrypted
Executive order 12333
Executive Order 12333, signed on December 4, 1981 by U.S. President Ronald Reagan,
was an Executive Order intended to extend powers and responsibilities of U.S.
intelligence agencies and direct the leaders of U.S. federal agencies to
co-operate fully with CIA requests for information.
Learn more:
- https://en.wikipedia.org/wiki/Executive_Order_12333
- https://www.archives.gov/federal-register/codification/executive-order/12333.html
EXIF metadata
Metadata stored in JPEG files that may include technical information about the photo
like exposure, etc. and also geolocation of the photo if this feature is available
(i.e. the photo is taken by a smartphone with GPS).
Learn more:
- https://en.wikipedia.org/wiki/Exif
- https://www.howtogeek.com/211427/how-to-see-exactly-where-a-photo-was-taken-and-keep-your-location-private/
- https://alpinesecurity.com/blog/2-simple-ways-to-extract-gps-coordinates-from-pictures/
Exploit
A piece of software or a methodology (series of steps) that allows hackers to use a known vulnerability to get access to a target computer. More:
- https://en.wikipedia.org/wiki/Exploit_(computer_security))
- Exploit database: https://www.exploit-db.com/
F
Facebook Tor Hidden Service
A site that allows access to Facebook through the Tor protocol.
According to Alec Muffett “Facebook’s onion address provides a way to access Facebook through Tor
without losing the cryptographic protections provided by the Tor cloud. …
it provides end-to-end communication, from your browser directly into a Facebook datacentre.”
The address is facebookcorewwwi.onion where .onion is the common top-level domain name
for sites in Tor network. You can enter this domain name in the Tor Browser’s address field.
It won’t work in your normal (Chrome, Firefox, etc.) browser. More:
- https://en.wikipedia.org/wiki/Facebookcorewwwi.onion
- https://blog.torproject.org/facebook-hidden-services-and-https-certs
- https://www.cheatsheet.com/technology/what-is-facebooks-tor-hidden-service-why-does-it-matter.html/ (this one has a simple description of what Tor is and how it works)
Faraday cage
An enclosure that blocks electromagnetic fields. Could be a room, a cabinet, a bag.
Learn more:
FOB
A Forward Operating Base (FOB) is any secured forward operational level military position, commonly a military base, that is used to support strategic goals and tactical objectives.
Learn more:
- https://en.wikipedia.org/wiki/Forward_operating_base
- https://military.wikia.org/wiki/Forward_Operating_Base_Grizzly (
FOBGrizzly mentioned in the book) - https://en.wikipedia.org/wiki/Forward_Operating_Base_Grizzly
G
Garbage in, garbage out (GIGO)
This phrase was first used in November 1957 and is still quite popular among programmers
and mathematicians. It’s related to the terms FIFO (first in, first out) and
LIFO (last in, first out) that describe the behavior of the queue and stack data structures,
respectively.
Learn more:
- https://en.wikipedia.org/wiki/Garbage_in,_garbage_out
- https://techterms.com/definition/gigo
- https://en.wikipedia.org/wiki/FIFO_(computing_and_electronics))
- https://en.wikipedia.org/wiki/Stack_(abstract_data_type))
Google Glass
Smart glasses created by Google and first introduced in 2013.
Masha calls them “long-abandoned”, but according to Wikipedia in 2017 and 2019
Google announced Google Glass Enterprise Edition and Enterprise Edition 2 respectively.
Learn more:
H
Hardware keylogger
A device used to log all keystrokes on a computer which is used to capture passwords.
Learn more:
Hashing
Masha explains it pretty well in the book.
Learn more:
- https://en.wikipedia.org/wiki/Hash_function
- https://medium.com/tech-tales/what-is-hashing-6edba0ebfa67
Hoberman sphere
An isokinetic structure patented by Chuck Hoberman that resembles a geodesic dome, but is capable of folding down to a fraction of its normal size by the scissor-like action of its joints.
Learn more:
Hyperbolic discounting
It is well explained by Ange in the book. Hyperbolic discounting refers to the tendency for people to increasingly choose a smaller-sooner reward over a larger-later reward as the delay occurs sooner rather than later in time.
Learn more:
- http://www.behaviorlab.org/Papers/Hyperbolic.pdf
- https://en.wikipedia.org/wiki/Hyperbolic_discounting
I
IED
Improvised explosive device. More:
IMSI-catcher
A device that can pretend to be a cell phone base station and make all phones in the nearest proximity
to connect to it (because its signal stronger than the real cell towers that are farther away).
That way it will be able to collect all information about the connected phones such as IMSI
(international mobile subscriber identity), etc. Also it will be able to intercept phones’ traffic,
voice and data using “man-in-the-middle” attack.
Devices can be purchased online, as well as anti-IMSI-catchers.
You can build one yourself, if you want (see the link below).
Learn more:
- https://en.wikipedia.org/wiki/`IMSI`-catcher
- https://www.paladion.net/blogs/how-to-build-an-imsi-catcher-to-intercept-gsm-traffic
- https://www.vice.com/en/article/gy7qm9/how-i-made-imsi-catcher-cheap-amazon-github
Infect your phone with WhatsApp message
- https://arstechnica.com/information-technology/2019/05/whatsapp-vulnerability-exploited-to-infect-phones-with-israeli-spyware/
- https://www.2-spyware.com/remove-whatsapp-virus.html
Information Cascade
A pattern of information flow when you can see how information or decision coming from one person triggers the series of decisions or information passes from several other persons.
Learn more:
- https://en.wikipedia.org/wiki/Information_cascade
- https://arxiv.org/abs/2005.11041
- https://www.cs.cornell.edu/home/kleinber/networks-book/networks-book-ch16.pdf (part of a book “Networks, Crowds, and Markets” https://www.cs.cornell.edu/home/kleinber/networks-book/)
- Information Cascade Experiments https://wmpeople.wm.edu/asset/index/lrande/cascadehandbook
J
Jersey barrier
A Jersey barrier, Jersey wall, or Jersey bump is a modular concrete or plastic barrier employed to separate lanes of traffic.
Learn more:
- https://en.wikipedia.org/wiki/Jersey_barrier
- https://otwsafety.com/how-jersey-barriers-got-their-name/ (fun facts about)
K
Kettling
A police tactic for controlling large crowds.
Learn more:
L
Lidar
“Light radar” – a device that used laser light to scan the area and measure distances to objects, walls, etc. It is also used as an acronym of “light detection and ranging” and “laser imaging, detection, and ranging”. In the book Masha uses a drone to get “lidar outlines of all the human in the space”.
Learn more:
- https://en.wikipedia.org/wiki/Lidar
- https://www.neonscience.org/resources/learning-hub/tutorials/lidar-basics
LiveJournal
A social network platform created in 1999 that used to be popular before Facebook and Twitter.
In 2007 it was sold to Russian media company SUP Media. Written in Perl.
Learn more:
M
MAC address
Masha automatically corrects her boss when she says: “max address”.
MAC stands for “media access control” and MAC address means the low-level
address assigned to a network card.
Sometimes MAC address is called “physical address” or “hardware address”.
Usually it is represented as a series of hexadecimal numbers separated by
colons, like this: 00:0a:95:9d:68:16.
Usually MAC address identifies a physical device (computer or phone)
pretty well (as opposed to IP address that could be different in different networks).
MAC address can be changed by the OS, but that only stays until the next reboot.
Learn more:
- https://en.wikipedia.org/wiki/MAC_address
- https://whatismyipaddress.com/mac-address
- https://whatismyipaddress.com/change-mac https://www.howtogeek.com/192173/how-and-why-to-change-your-mac-address-on-windows-linux-and-mac/
Machine learning
Ange does a great job explaining machine learning as simple as possible.
Learn more:
Malware
Malicious software: software intentionally designed to cause damage to computer systems.
Learn more:
Malware attack on baseband radio
Baseband vulnerabilities give attackers the ability to monitor a phone’s communications, place calls, send premium SMS messages or cause large data transfers unbeknownst to the owner of the phone.
Learn more:
- https://www.usenix.org/system/files/conference/woot12/woot12-final24.pdf
- https://ccdcoe.org/uploads/2018/10/Art-16-Attacking-the-Baseband-Modem-of-Breach-the-Users-Privacy-and-Network-Security.pdf
- https://threatpost.com/baseband-zero-day-exposes-millions-of-mobile-phones-to-attack/124833/
- https://attack.mitre.org/techniques/T1477/
Man-in-the-middle attack
This is the category of attacks where the attacker injects something in the transmission channel (voice, data, etc.) that can listen to the traffic and potentially alter the traffic.
Learn more:
- https://en.wikipedia.org/wiki/Man-in-the-middle_attack
- https://www.rapid7.com/fundamentals/man-in-the-middle-attacks/
Microfiche
A sheet of flat film, 105x148 mm in size, that contains a set of microimages, usually of size 10x14 mm. It is used to store books, magazines, newspapers in a compact and durable form.
Learn more:
MIT Media Lab
A research lab at MIT famous for its inventions and projects in areas of human-computer interaction,
artistic visualization, musical devices, sociable robots, etc.
Learn more:
MRE
The Meal, Ready-to-Eat – commonly known as the MRE – is a self-contained,
individual field ration in lightweight packaging bought by the United States
Department of Defense for its service members for use in combat or other field
conditions where organized food facilities are not available.
Learn more:
MySpace
A social network that used to be the largest social networking site in the world (between 2005 and 2009).
Learn more:
N
NFC, Near-Field Communication
A set of communication protocols for communication between two electronic devices over a distance of 4 cm. Used in various types of key cards, passes. etc.
Learn more:
O
Openstreetmap
Wrongly called “Openstreetmaps” in the book. An open source alternative to Google Maps.
Learn more:
- https://www.openstreetmap.org/
- https://en.wikipedia.org/wiki/OpenStreetMap
- https://wiki.osmfoundation.org/wiki/Main_Page
P
Paranoid Android
In the book it seems to be the Android-based OS for smartphones focused on security.
The main feature of it is that you update it very often to make sure all known
vulnerabilities are patched or at least there are no known exploits for them.
Masha explains that you should always check the OS signatures to make sure
you are actually installing the correct bits and not something created by
the government hackers containing backdoors and loggers.
Apparently there is such a project in real life, but it’s not specifically
focused on security – it just uses the cool name.
Learn more:
ParanoidLinux
There is a project with this name (https://sourceforge.net/projects/linuxparanoid/) but it doesn’t seem to be active. Most likely what Masha means by ParanoidLinux is Tails (https://boingboing.net/2019/12/16/paranoid-linux-for-real.html).
Pastebin
A storage site where people can post pieces of code and other text information.
Learn more:
PGP
Pretty Good Privacy, a cryptographic method used for encryption and digital signing documents, emails, etc.
Learn more:
- https://en.wikipedia.org/wiki/Pretty_Good_Privacy
- https://users.ece.cmu.edu/~adrian/630-f04/`PGP`-intro.html (how it works)
- https://www.openpgp.org/
- https://gnupg.org/
Public-private key cryptography
Again, Masha does a great job explaining the basics.
Learn more:
- https://en.wikipedia.org/wiki/Public-key_cryptography
- https://ssd.eff.org/en/module/deep-dive-end-end-encryption-how-do-public-key-encryption-systems-work
- https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption
Pwned
Historically it’s a misspelled word “owned” (part of leetspeak) which is now used when somebody
compromised your device (phone, computer) or your data and now you are pwned
by bad guys.
There is a site called “Have I been pwned?” which allows you to check if your
personal data was leaked during one of the known data breaches.
Learn more:
- https://en.wikipedia.org/wiki/Leet#Owned_and_pwned
- https://en.wikipedia.org/wiki/Have_I_Been_Pwned%3F
- https://haveibeenpwned.com/
- https://www.urbandictionary.com/define.php?term=pwned
PX
A type of retail store operating on United States military installations worldwide.
Originally akin to trading posts, they now resemble department stores or strip malls.
PX is US Army terminology. US Air Force uses Base Exchange (BX), US Navy uses
Navy Exchange (NEX), Marine Corps calls it Marine Corps Exchange (MCX).
Learn more:
R
Raspi Altair 8800
Altair 8800 is one of the first personal computers which was introduced in 1974. For many people it has sentimental value – that’s why some people design and sell Altair emulators that use modern technologies such as Arduino and Raspberry Pi.
Learn more:
- https://en.wikipedia.org/wiki/Altair_8800
- https://www.adwaterandstir.com/product/altair-8800-emulator-kit/
- https://github.com/dankar/altair8800
- http://www.astrorat.com/altair8800/altair8800clonemeetrp.html
Red team
A red team is a group that helps organizations to improve themselves by providing opposition to the point of view of the organization that they are helping.
Learn more:
- https://en.wikipedia.org/wiki/Red_team
- https://csrc.nist.gov/glossary/term/Red_Team
- https://www.redteamsecure.com/blog/what-is-red-teaming-and-why-do-i-need-it-2/
Regular expressions
A (smart) way to search specific patterns or strings in text files. You can describe patterns like “one to three numbers followed by a dash followed by several capital letters, no more than 8.”
Learn more:
- https://en.wikipedia.org/wiki/Regular_expression
- https://regexr.com/
- https://regexone.com/ (interactive tutorial)
Reverse shell
A method to connect back to the attacking computer from the target computer.
Because it is initiated from the target computer it can be a way to bypass
a firewall or NAT service.
Learn more:
- https://www.netsparker.com/blog/web-security/understanding-reverse-shells/
- https://hackernoon.com/reverse-shell-cf154dfee6bd
RFID (Radio-frequency identification)
A method of exchanging identification information over radio.
It includes RFID tags and RFID readers.
RFID tags can be passive (i.e. not containing any battery) and really cheap.
They get the energy they need to operate from the reader that reads from them.
Learn more:
- https://en.wikipedia.org/wiki/Radio-frequency_identification
- https://www.rfidjournal.com/
- https://resources.bishopfox.com/resources/tools/rfid-hacking/attack-tools/
Riseup
Masha receives an email from Kriztina from her address at riseup.net.
Riseup provides online communication tools for people and groups working on liberatory social
change.
We are a project to create democratic alternatives and practice self-determination by
controlling our own secure means of communications.
RPG
Not a Role-Playing Game (here).
A rocket-propelled grenade (often abbreviated RPG) is a shoulder-fired missile
weapon that launches rockets equipped with an explosive warhead.
Fun fact:
The term “rocket-propelled grenade” is a backronym; it stems from the Russian
language РПГ which stands for ручной противотанковый гранатомёт (transliterated as
“ruchnoy protivotankovy granatomyot”, which has the initials “RPG”), meaning
“handheld anti-tank grenade launcher”, the name given to early Russian designs.
Typical range is around several hundred meters.
Learn more:
S
Safe Hex
The rules for safe computing.
Learn more:
Shift-tilt miniature
Tilt–shift photography (Masha incorrectly calls it “shift-tilt”) is the use of camera
movements that change the orientation or position of the lens with respect to the film
or image sensor on cameras.
+
Sometimes the term is used when the large depth of field is simulated with digital
post-processing; the name may derive from a perspective control lens (or tilt–shift lens)
normally required when the effect is produced optically.
Learn more:
- https://en.wikipedia.org/wiki/Tilt%E2%80%93shift_photography
- https://www.masterclass.com/articles/how-to-shoot-tilt-shift-photography
- https://www.smashingmagazine.com/2008/11/beautiful-examples-of-tilt-shift-photography/
Signal
A communication application which is considered to be the most secure for end-to-end
encryption. Trusted and used by Edward Snowden, Jack Dorsey, Bruce Schneier.
It uses the open-source Signal protocol.
Works on iOS, Android, Linux, macOS, Windows
Learn more:
SIM-shaped tentacle
Most likely Masha uses a SIM extension cable similar to this: https://www.microsatacables.com/micro-sim-card-to-sim-card-extension-cable-msim-1175-ext
Stalkerware
Monitoring software or spyware that is used for stalking. The term was coined when people started to widely use commercial spyware to spy on their spouses or intimate partners.
Learn more:
- https://en.wikipedia.org/wiki/Stalkerware
- https://stopstalkerware.org/what-is-stalkerware/
- https://securelist.com/the-state-of-stalkerware-in-2019/93634/
Stylometry
A method to study linguistic style to find out who the author of the document is.
Learn more:
- https://en.wikipedia.org/wiki/Stylometry
- https://programminghistorian.org/en/lessons/introduction-to-stylometry-with-python
Sukey
Sukey is an organization which emerged in Britain on 28 January 2011, with the aim of improving communications among participants in the student demonstrations. Its immediate aim was to counteract the police tactics of kettling, by coordinating information electronically and transmitting it to the protesters, allowing them to avoid the police kettle.
Learn more:
T
Tails
A security-focused Linux distribution that aims at preserving privacy and anonymity.
It usually loads from a live DVD or USB and provides Linux environment that is based on Tor network.
Your browsing information is not stored anywhere unless you specifically instruct it to do so.
Tails provides an emergency shutdown: when you pull the USB out of the slot, the system
erases all computer memory and shuts itself down immediately.
Learn more:
Threat model
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized.
Learn more:
- https://en.wikipedia.org/wiki/Threat_model
- https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/
- https://owasp.org/www-community/Application_Threat_Modeling
Tunnel out
To use an SSH tunnel to get secure access to a remote box. Usually you use SSH tunneling
to bypass firewalls that prohibit certain Internet services. More:
- https://en.wikipedia.org/wiki/Tunneling_protocol#Secure_Shell_tunneling
- https://www.ssh.com/ssh/tunneling/example
U
Unique identifiers of tire-pressure sensors
Tire-pressure sensors installed on most of the cars have unique ID numbers configured at the factory. More:
- https://en.wikipedia.org/wiki/Direct_TPMS#Registration_of_direct_TPMS_IDs
- https://blog.caristaapp.com/what-is-tpms-id-registration-2cfc452bb6d4
- https://www.standardbrand.com/media/1646/st10235idl-may14_jtf_id-locator.pdf
- https://obdstation.com/tpms-reset-tool/
USB Port Physical Lock
There are several variants of such a device that physically blocks access to the USB port.
Some of them have keys, some should be physically destroyed to get access to the port.
Examples:
- https://www.padjack.com/padjack-versions/usb-port-lock/ (should be destroyed and resealed later)
- https://connectivitycenter.com/product/smart-keeper-usb-port-lock-professional/ (used with a key)
- https://lindy.com/en/technology/port-blockers/ (with a key)
USB stick with keypad
Probably Marcus uses something like this: https://www.amazon.com/Encrypted-Certified-Protection-Encryption-16G/dp/B07JNDW5H7/
Usenet
A “prehistoric” social network that was created around 1980.
The name comes from the term “users network”.
It was used for discussions and asking questions. It has a hierarchical structure
of topics called “newsgroups”.
Even before Internet became widely available it used UUCP (Unix-to-Unix Copy) program to
exchange posts and updates over telephone lines.
Learn more:
USG
USG is a USB firewall that can protect your computer from BadUSB.
Learn more:
- https://hothardware.com/news/usg-dongle-firewall-device-is-like-a-condom-for-your-usb-ports
- https://github.com/robertfisk/`USG`
- https://github.com/robertfisk/`USG`/wiki
Uslon prison
Apparently it’s an abbreviation from GULAG days, not a place:
USLON: “Upravlenie Severnykh Lagerey Osobogo Naznacheniya”, Directorate of Northern Special-Significance Camps
Learn more:
W
WAP (Wireless Application Protocol)
A protocol that was used by cell phones to access the Internet in the early 2000s.
WAP browser is an application that can display text and pictures on the phone’s screen.
It was used before smartphones became widely available because it could work with
really small screens and low transmission speeds of that time.
Learn more:
X
XML (Extensible Markup Language)
A markup language used by many applications to store and exchange information and documents.
Learn more: