<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Security – Yeri Tiete</title>
    <link>https://yeri.be/tag/security/</link>
    <description>Yeri Tiete&#39;s blog</description>
    <language>en</language>
    <copyright>© Yeri Tiete</copyright>
    <lastBuildDate>Wed, 06 May 2015 11:14:55 +0200</lastBuildDate>
    <atom:link href="https://yeri.be/tag/security/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Stibbe - Cybercrime</title>
      <link>https://yeri.be/stibbe-cybercrime/</link>
      <pubDate>Wed, 06 May 2015 11:14:55 +0200</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/stibbe-cybercrime/</guid>
      <description>&lt;p&gt;Short presentation about the ease of finding and getting into unprotected systems.&lt;/p&gt;&#xA;&lt;iframe src=&#34;https://www.slideshare.net/slideshow/embed_code/key/JjloQH8mJ8rVZG&#34; width=&#34;476&#34; height=&#34;400&#34; frameborder=&#34;0&#34; marginwidth=&#34;0&#34; marginheight=&#34;0&#34; scrolling=&#34;no&#34;&gt;&lt;/iframe&gt;&#xA;&lt;p&gt;PDF can be downloaded &lt;a href=&#34;https://static.yeri.be/2015/05/stibbe.pdf&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Presentation given at Stibbe on 5 May 2015.&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>Short presentation about the ease of finding and getting into unprotected systems.</p>
<iframe src="https://www.slideshare.net/slideshow/embed_code/key/JjloQH8mJ8rVZG" width="476" height="400" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe>
<p>PDF can be downloaded <a href="https://static.yeri.be/2015/05/stibbe.pdf">here</a>.</p>
<p>Presentation given at Stibbe on 5 May 2015.</p>
]]></content:encoded>
      <category>networking</category><category>software</category>
      <category>law</category><category>security</category>
    </item>
    
    <item>
      <title>The Last Word on CCTV</title>
      <link>https://yeri.be/the-last-word-on-cctv/</link>
      <pubDate>Thu, 17 Mar 2011 15:22:24 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/the-last-word-on-cctv/</guid>
      <description>&lt;p style=&#34;text-align: center;&#34;&gt;&lt;iframe title=&#34;YouTube video player&#34; width=&#34;100%&#34; height=&#34;390&#34; src=&#34;https://www.youtube.com/embed/NjScdABvS48&#34; frameborder=&#34;0&#34; allowfullscreen&gt;&lt;/iframe&gt;&lt;/p&gt;&#xA;&lt;a href=&#34;http://www.corbettreport.com/when-the-criminals-control-the-cameras/&#34; target=&#34;_blank&#34;&gt;Source&lt;/a&gt;.</description>
      <content:encoded><![CDATA[<p style="text-align: center;"><iframe title="YouTube video player" width="100%" height="390" src="https://www.youtube.com/embed/NjScdABvS48" frameborder="0" allowfullscreen></iframe></p>
<a href="http://www.corbettreport.com/when-the-criminals-control-the-cameras/" target="_blank">Source</a>.
]]></content:encoded>
      <category>misc</category>
      <category>cctv</category><category>security</category><category>youtube</category>
    </item>
    
    <item>
      <title>PGP public key</title>
      <link>https://yeri.be/pgp-public-key/</link>
      <pubDate>Tue, 15 Feb 2011 15:41:08 +0100</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/pgp-public-key/</guid>
      <description>&lt;center&gt;&lt;iframe src=&#34;https://static.yeri.be/yeri.key.txt&#34; width=&#34;545&#34; height=&#34;771&#34;&gt;&#xA;  &lt;p&gt;Your browser does not support iframes.&lt;/p&gt;&#xA;&lt;/iframe&gt;&lt;/center&gt;</description>
      <content:encoded><![CDATA[<center><iframe src="https://static.yeri.be/yeri.key.txt" width="545" height="771">
  <p>Your browser does not support iframes.</p>
</iframe></center>
]]></content:encoded>
      <category>apple</category><category>linux</category><category>software</category>
      <category>tuinslak</category><category>security</category><category>yeri</category><category>yeri tiete</category>
    </item>
    
    <item>
      <title>Mibbit</title>
      <link>https://yeri.be/mibbit/</link>
      <pubDate>Sun, 13 Apr 2008 03:08:48 +0200</pubDate>
      <author>Yeri Tiete</author>
      <guid isPermaLink="true">https://yeri.be/mibbit/</guid>
      <description>&lt;p&gt;It has been a while since I had something interesting to say.&lt;/p&gt;&#xA;&lt;p&gt;Anyway, I&amp;rsquo;ve recently found out, from pretty good sources, that &lt;a href=&#34;http://www.mibbit.com/&#34; target=&#34;_blank&#34;&gt;Mibbit&lt;/a&gt; is logging all conversations sent trough the website.&lt;/p&gt;&#xA;&lt;p&gt;This might include NickServ/authentication passwords.&lt;/p&gt;&#xA;&lt;p&gt;There is no official EULA stating this is being done, thus being a violation of privacy. (but who cares about privacy these days?)&lt;/p&gt;&#xA;&lt;p&gt;Mibbit is a young, fast growing, webbased IRC-client.&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>It has been a while since I had something interesting to say.</p>
<p>Anyway, I&rsquo;ve recently found out, from pretty good sources, that <a href="http://www.mibbit.com/" target="_blank">Mibbit</a> is logging all conversations sent trough the website.</p>
<p>This might include NickServ/authentication passwords.</p>
<p>There is no official EULA stating this is being done, thus being a violation of privacy. (but who cares about privacy these days?)</p>
<p>Mibbit is a young, fast growing, webbased IRC-client.</p>
]]></content:encoded>
      <category>misc</category>
      <category>wtf</category><category>privacy</category><category>security</category>
    </item>
    
  </channel>
</rss>
