Further Hacks on the Calypso Platform
OR How to Turn a Phone into a BTS The calypso baseband and its companion chips are used on the Motorola C123 among other and are now well known for […]
Our Daily Job Hacking the Law
The key elements of policy hacking Legal systems have a huge impact on what we do as hackers, but also on internet users in general. Laws can restrict our freedom […]
The Tor Software Ecosystem

At the very beginning, Tor was just a socks proxy that protected the origin and/or destination of your TCP flows. Now the broader Tor ecosystem includes a diverse set of […]
Hacking Cisco Phones
Just because you are paranoid doesn’t mean your phone isn’t listening to everything you say We discuss a set of 0-day kernel vulnerabilities in CNU (Cisco Native Unix), the operating […]
Page Fault Liberation Army
A History of Creative x86 Virtual Memory Uses The x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry […]
We Are All Lawmakers

How to further transparency by law – the Hamburg example and beyond In the Free City of Hamburg, which is one of 16 German states, a coalition of hackers, activists […]