Category Archives: Kudos

Government 2.0, Open Data and WikiLeaks

The concepts behind WikiLeaks, OpenLeaks, GlobalLeaks, BalkanLeaks is much more than just revealing secrets to the public.

It’s part of a revolution that’s coming in government’s organization, transparency and cooperation with so called ‘web 2.0 / wiki’ collaborative systems.

Have a look at those Government 2.0 - Introduction by Anke Domscheit Berg, Innovative Government Program Leads of Microsoft Germany and wife of Daniel Berg, co-founder of WikiLeaks and now founder of OpenLeaks.

Have a look at Open Data government 2.0 initiative to enforce government transparency, reducing corruption and improving performance of government organization.

That revolution it’s just more than a group of anarco-libertarian funky guys that want to create chaos by spreading secrets, it’s just the start of the rush to achieve new organization model of governments by leveraging complete transparency and strong cooperation with citizens.

27C3 - CCC Congress CFP: We come in peace

We come in peace


We come in peace, said the conquerers of the New World.

We come in peace, says the government, when it comes to colonise, regulate, and militarise the new digital world.

We come in peace, say the nation-state sized companies that have set out to monetise the net and chain the users to their shiny new devices.

We come in peace, we say as hackers, geeks and nerds, when we set out towards the real world and try to change it, because it has intruded into our natural habitat, the cyberspace…

Call for paper for participation to 27C3 CCC congress is open, and i never saw a so exciting payoff :-)

See you on 30 December 2010 in Berlin!

Celebrating “Hackers” after 25 years

A cult book, ever green since 25 years.


It’s been 25 years since “Hackers” was published. Author Steven Levy reflects on the book and the movement.
Steven Levy wrote a book in the mid-1980s that introduced the term "hacker" -- the positive connotation -- to a wide audience. In the ensuing 25 years, that word and its accompanying community have gone through tremendous change. The book itself became a mainstay in tech libraries.
O'Reilly recently released an updated 25th anniversary edition of "Hackers," so I checked in with Levy to discuss the book's development, its influence, and the role hackers continue to play.

Exploit code against SecurStar DriveCrypt published

It seems that the hacking community somehow like to target securstar products, maybe because hacking community doesn’t like the often revealed unethical approach already previously described in this blog by articles and user’s comments.

In 2004 a lot of accusation against Hafner of SecurStar went out because of alleged intellectual property theft regarding opensource codes such as Encryption 4 the masses and legal advert also against the Free and opensource TrueCrypt project .

In 2008 there was a pre-boot authentication hacking against DriveCrypt Plus posted on Full-Disclosure.

Early 2010 it was the time of the fake infosecurity research secretly sponsored by securstar at (that now they tried to remove from the web because of embarrassing situation, but backup of the story are available, hacking community still wait for apologies) .

Now, mid 2010, following a research published in December 2009 about Disk Encryption software vulnerabilities made by Neil Kettle (mu-b), Security researcher at digit-labs and Penetration tester at Convergent Network Solutions , DriveCrypt was found to be vulnerable and exploitable breaking on-device security of the system and exploit code has been just released.

Exploit code reported below (thanks Neil for the code release!):

  • Arbitrary kernel code execution security exploit of DriveCrypt: drivecrypt-dcr.c
  • Arbitrary file reading/writing security exploit via unchecked user-definable parameters to ZxCreateFile/ReadFile/WriteFile: drivecrypt-fopen.c

The exploit code has been tested against DriveCrypt 5.3, currently released DriveCrypt 5.4 is reported to be vulnerable too as it has just minor changes related to win7 compatibility. Can anyone make a double check and report a comment here?

Very good job Neil!

In the meantime the Free Truecrypt is probably the preferred choice for disk encryption, given the fact that it’s difficult to trust DriveCrypt, PGP has been acquired by Symantec and there are very bad rumors about the trust that people have in Symantec and there are not many widely available alternatives.

Rumors say that also PhoneCrypt binaries are getting analyzed and the proprietary encryption system could reveal something fun…