11Th International Conference on Cyber Conflict: Silent Battle 2019

Total Page:16

File Type:pdf, Size:1020Kb

11Th International Conference on Cyber Conflict: Silent Battle 2019 2019 11th International Conference on Cyber Conflict: Silent Battle T. Minárik, S. Alatalu, S. Biondi, M. Signoretti, I. Tolga, G. Visky (Eds.) 28 May – 31 May 2019, Tallinn, Estonia 2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT: SILENT BATTLE Copyright © 2019 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1926N-PRT ISBN (print): 978-9949-9904-4-3 ISBN (pdf): 978-9949-9904-5-0 COPYRIGHT AND REPRINT PERMissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, or for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2019 11th International Conference on Cyber Conflict: Silent Battle T. Minárik, S. Alatalu, S. Biondi, M. Signoretti, I. Tolga, G. Visky (Eds.) 2019 © NATO CCD COE Publications NATO CCD COE Publications LEGAL NOTICE: This publication contains the opinions of the respective authors only. They do not Filtri tee 12, 10132 Tallinn, Estonia necessarily reflect the policy or the opinion of NATO Phone: +372 717 6800 CCD COE, NATO, or any agency or any government. NATO CCD COE may not be held responsible for Fax: +372 717 6308 any loss or harm arising from the use of information E-mail: [email protected] contained in this book and is not responsible for the Web: www.ccdcoe.org content of the external sources, including external websites referenced in this publication. Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE The NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) is a NATO- accredited knowledge hub in Tallinn, Estonia, offering a unique interdisciplinary approach to the most relevant issues in cyber defence. We conduct research, trainings and exercises in four core areas: technology, strategy, operations and law. The heart of the Centre is a diverse group of international experts from military, government, academia and industry, representing currently 21 member nations. Almost half as many nations are aspiring to become member in the years to come. NATO CCD COE’s mission is to support its member nations and NATO in the fields of cyber defence research, training and exercises. The Centre provides cyber defence expertise in the fields of technology, strategy, operations and law, often in an interdisciplinary manner. NATO CCD COE embodies and fosters the cooperation of like-minded nations in cyber defence. Our member nations are allies in NATO and like-minded partners beyond the Alliance. Research Areas Among other research areas, NATO CCD COE experts are currently involved in the analysis of autonomous features of cyber operations, digital forensics, protection of critical infrastructure, Cyber Command and Control, cyber deterrence, cyber effects in battlefield and attribution. NATO CCD COE is home of the Tallinn Manual 2.0, the most comprehensive guide for policy advisors and legal experts on how International Law applies to cyber operations carried out between and against states and state actors. An invaluable analysis by an international group of renowned scholars published in 2017, continues to inspire both academic research and state practice. Most of the Centre’s publications and research papers are available online on the Centre’s website www.ccdcoe.org, similarly to a database of national cyber security strategies, the International Cyber Developments Review and comprehensive overviews of national cyber security organizations. Education and Training NATO CCD COE promotes lifelong learning in cyber security. Our training courses are based on our latest research and cyber defence exercises. To best meet the training requirements of our Allies, Partners and NATO as a whole, we provide courses in different formats and locations, covering a broad range of topics in the technical, legal, strategic and operational cyber security domains. NATO CCD COE is responsible for identifying and coordinating education and training solutions in cyber defence for all NATO bodies across the Alliance. NATO Allied Command Transformation has provided NATO CCD COE with an unconditional quality assurance accreditation for its contribution to high-quality NATO Education and Training. CYCON 2019 SPONSORS TABLE OF CONTENTS Introduction 1 For a Baltic Cyberspace Alliance? 9 Martin C. Libicki “Silent Battle” Goes Loud: Entering a New Era 23 of State-Avowed Cyber Conflict Keir Giles and Kim Hartmann Call to Action: Mobilizing Community Discussion to 37 Improve Information-Sharing About Vulnerabilities in Industrial Control Systems and Critical Infrastructure Daniel Kapellmann and Rhyner Washburn Hidden Risks to Cyberspace Security 61 from Obsolete COTS Software Barış Egemen Özkan and Serol Bulkan Applying Indications and Warning Frameworks to Cyber Incidents 81 Bilyana Lilly, Quentin Hodgson, Lillian Ablon and Adam Moore Recommendations for Enhancing the Results of Cyber Effects 103 Erwin Orye and Olaf Maennel Rough-and-Ready: A Policy Framework to Determine 123 if Cyber Deterrence is Working or Failing Jason Healey and Neil Jenkins The All-Purpose Sword: North Korea’s 143 Cyber Operations and Strategies Ji Young Kong, Kyoung Gon Kim and Jong In Lim NATO Members’ Organizational Path Towards Conducting 163 Offensive Cyber Operations: A Framework for Analysis Max Smeets What are Military Cyberspace Operations Other Than War? 179 Brad Bigelow Covert or not Covert: National Strategies 197 During Cyber Conflict Gil Baram and Udi Sommer The Cyber-ASAT: On the Impact of Cyber 213 Weapons in Outer Space James Pavur and Ivan Martinovic Challenges and Opportunities to Counter Information 231 Operations Through Social Network Analysis and Theory Alicia Bargar, Janis Butkevics, Stephanie Pitts and Ian McCulloh Understanding the Strategic Implications 249 of the Weaponization of Artificial Intelligence Joe Burton and Simona R. Soare Hidden in the Shadow: The Dark Web – 267 A Growing Risk for Military Operations? Robert Koch SamSam and the Silent Battle of Atlanta 291 Kenneth Kraszewski The Contours of ‘Defend Forward’ 307 Under International Law Jeff Kosseff The Rise of the Regionals: How Regional 321 Organisations Contribute to International Cyber Stability Negotiations at the United Nations Level Nikolas Ott and Anna-Maria Osula Layered Sovereignty: Adjusting Traditional 347 Notions of Sovereignty to a Digital Environment Przemysław Roguski The Sound of Silence: International Law and 361 the Governance of Peacetime Cyber Operations Barrie Sander Addressing Adversarial Attacks Against 383 Security Systems Based on Machine Learning Giovanni Apruzzese, Michele Colajanni, Luca Ferretti and Mirco Marchetti Machine Learning-based Detection of C&C Channels 401 with a Focus on the Locked Shields Cyber Defense Exercise Nicolas Känzig, Roland Meier, Luca Gambazzi, Vincent Lenders and Laurent Vanbever Neural Network-Based Technique for Android 421 Smartphone Applications Classification Roman Graf, Ross King and Aaron Kaplan Cyber-Physical Battlefield Platform for 439 Large-Scale Cybersecurity Exercises Joonsoo Kim, Kyungho Kim and Moonsu Jang Resilience of Cyber-Physical Systems: an Experimental 459 Appraisal of Quantitative Measures Giuseppina Murino, Alessandro Armando and Armando Tacchella Detection of Malicious Remote Shell Sessions 479 Pierre Dumont, Roland Meier, David Gugelmann and Vincent Lenders BlackWidow: Monitoring the Dark Web 499 for Cyber Security Information Matthias Schäfer, Martin Strohmeier, Marc Liechti, Markus Fuchs, Markus Engel and Vincent Lenders Towards Measuring Global DDoS Attack Capacity 521 Artūrs Lavrenovs Silent Battles: Towards Unmasking Hidden Cyber Attack 537 Robert Koch and Mario Golling Biographies 557 INTRODUCTION The annual International Conference on Cyber Conflict (CyCon) is entering its second decade. CyCon 2019 is the 11th iteration of the conference, organised by the NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) and taking place in Tallinn from 28 to 31 May 2019. Since 2009, CyCon has become a landmark conference addressing cyber conflict and security from the perspectives of technology, strategy, operations, law and policy. It brings together a trusted circle of decision- makers and experts representing government, the military, academia and the private sector. With the launch of the annual CyCon US conference series in cooperation with the US Army Cyber Institute in 2016, CyCon also serves as a transatlantic forum for the community of interest to discuss the most pressing issues of the cyber domain twice a year. The debates and presentations at CyCon stem both from original research papers submitted by the academic community and from insights offered by renowned experts in the field. The core topic of CyCon 2019 is ‘Silent Battle’. The topic is broad enough to allow for diverse interpretations: a techie will think in terms of vulnerabilities, exploits and patches; a policy advisor could approach it as detection and attribution; a lawyer may interpret it through the lens of responsibility; and the military may approach it in terms of situational awareness.
Recommended publications
  • The Future of Demilitarisation and Civil Military Relations in West Africa: Challenges and Prospects for Democratic Consolidation*
    The African e-Journals Project has digitized full text of articles of eleven social science and humanities journals. This item is from the digital archive maintained by Michigan State University Library. Find more at: http://digital.lib.msu.edu/projects/africanjournals/ Available through a partnership with Scroll down to read the article. Afr.j. polit. sci. (1998), Vol. 3 No. 1, 82-103 The Future of Demilitarisation and Civil Military Relations in West Africa: Challenges and Prospects for Democratic Consolidation* J 'Kayode Fayemi** Abstract This paper examines the state of civil-military relations and the prospects for demilitarisation anddemocratisation in contemporary West Africa. Its underlying thesis is that West Africa poses one of the greatest dilemmas to the prospects for demilitarisation in Africa. At the same time, it offers a potentially useful mecha- nism for regional peace and security with implications for (de)militarisation in Africa. While the paper recognises the historico-structural dimensions of militarisation as well as the behavioural obstacles to demilitarisation, it captures the challenges and prospects in terms of the complexity of state-civil society relations and suggests a holistic understanding of the concept of security. This, it does with a view to de-emphasising force as the key mechanism for conflict resolution, and promoting an inclusive institutionalframework for demilitarisation and development. Introduction Militarisation is a multi-dimensional process containing phenomena such as rearmament, the growth of armed forces, an increasing role for the military in decision making process, an increasing role for force in conflict resolution and the spread of " militaristic" values. In general,... militarisation is a process whereby the "civilian" sphere is increasingly militarised towards a state of excess, usually referred to as "militarism" (Hettne, 1988,18).
    [Show full text]
  • Advanced Persistent Threats
    THREAT RESEARCH Defending Against Advanced Persistent Threats Introduction As the name “Advanced” suggests, APT (advanced persistent threat) is one of the most sophisticated and organized forms of network attacks that keep cybersecurity professionals up at night. Unlike many hit & run traditional cyberattacks, an APT is carried out over a prolonged period of time by skilled threat actors who strategize multi-staged campaigns against their targets, employing clandestine tools & techniques such as Remote Administration Tools (RAT), Toolkits, Backdoor Trojans, Social Engineering, DNS Tunneling etc. These experienced cybercriminals are mostly backed & well-funded by nation states and corporation-backed organizations to specifi cally target high value organizations with the following objectives in mind: a Theft of Intellectual Property & classifi ed data i.e. Cyber Espionage a Access to critical & sensitive communications a Access to credentials of critical systems a Sabotage or exfi ltration of databases a Theft of Personal Identifi able Information (PII) a Access to critical infrastructure to perform internal reconnaissance To achieve the above goals, APT Groups use novel techniques to obfuscate their actions and easily bypass traditional security barriers that are not advancing at the same rate as the sophisticated attack patterns of cybercriminals. To understand the evolved behavioral pattern of APT Groups in the year 2020, a review of their latest activities revealed interesting developments and a few groundbreaking events¹: a Southeast Asia
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship
    Threat modeling and circumvention of Internet censorship David Fifield September 27, 2017 Abstract Research on Internet censorship is hampered by a lack of adequate models of censor behavior, encompassing both censors' current practice and their likely future evolution. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not only as a set of capabilities| such as the ability to monitor network traffic—but also as a set of priorities constrained by resource limitations. A circumvention system designed under inadequate assumptions runs the risk of being either easily blocked, or impractical to deploy. My thesis research will be concerned with developing empirically informed censor models and practical, effective circumvention systems to counter them. My goal is to move the field away from seeing the censorship problem as a cat-and-mouse game that affords only incre- mental and temporary advancements. We should instead state the hypotheses and assumptions under which our circumvention designs will work|with the designs being more or less practical depending on how well the hypotheses and assumptions match the behavior of real-world censors. 1 Thesis My research is about Internet censorship and how to make it ineffective. To this end, I am interested in building useful models of real-world censors as they exist today and may exist in the future, for the purpose of building circumvention systems that are not only sound in theory but also effective in practice. 1 2 Scope Internet censorship is an enormous topic. My thesis research is concerned with one important case of it: the border firewall.
    [Show full text]
  • Horizontal PDF Slides
    1 2 The first 10 years of Curve25519 Abstract: “This paper explains the design and implementation Daniel J. Bernstein of a high-security elliptic-curve- University of Illinois at Chicago & Diffie-Hellman function Technische Universiteit Eindhoven achieving record-setting speeds: e.g., 832457 Pentium III cycles 2005.05.19: Seminar talk; (with several side benefits: design+software close to done. free key compression, free key validation, and state-of-the-art 2005.09.15: Software online. timing-attack protection), 2005.09.20: Invited talk at ECC. more than twice as fast as other authors’ results at the same 2005.11.15: Paper online; conjectured security level (with submitted to PKC 2006. or without the side benefits).” 1 2 3 The first 10 years of Curve25519 Abstract: “This paper explains Elliptic-curve computations the design and implementation Daniel J. Bernstein of a high-security elliptic-curve- University of Illinois at Chicago & Diffie-Hellman function Technische Universiteit Eindhoven achieving record-setting speeds: e.g., 832457 Pentium III cycles 2005.05.19: Seminar talk; (with several side benefits: design+software close to done. free key compression, free key validation, and state-of-the-art 2005.09.15: Software online. timing-attack protection), 2005.09.20: Invited talk at ECC. more than twice as fast as other authors’ results at the same 2005.11.15: Paper online; conjectured security level (with submitted to PKC 2006. or without the side benefits).” 1 2 3 The first 10 years of Curve25519 Abstract: “This paper explains Elliptic-curve computations the design and implementation Daniel J. Bernstein of a high-security elliptic-curve- University of Illinois at Chicago & Diffie-Hellman function Technische Universiteit Eindhoven achieving record-setting speeds: e.g., 832457 Pentium III cycles 2005.05.19: Seminar talk; (with several side benefits: design+software close to done.
    [Show full text]
  • What Every CEO Needs to Know About Cybersecurity
    What Every CEO Needs to Know About Cybersecurity Decoding the Adversary AT&T Cybersecurity Insights Volume 1 AT&T Cybersecurity Insights: Decoding the Adversary 1 Contents 03 Letter from John Donovan Senior Executive Vice President AT&T Technology and Operations 04 Executive Summary 05 Introduction 07 Outsider Threats 15 Looking Ahead: Outsider Threats 16 Best Practices: Outsiders 18 Insider Threats 24 Looking Ahead: New Potential Threats 25 Looking Ahead: Emerging Risks 26 Best Practices: Malicious Insiders 27 Best Practices: Unintentional Insiders 28 Moving Forward 32 Conclusion 33 Know the Terms For more information: Follow us on Twitter @attsecurity 35 End Notes and Sources Visit us at: Securityresourcecenter.att.com © 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T Globe logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. The information contained herein is not an offer, commitment, representation or warranty by AT&T and is subject to change. 2 ATT.com/network-security Business leader, Welcome to the inaugural issue of AT&T Cybersecurity Insights, a comprehensive look at our analysis and findings from deep inside AT&T’s network operations groups, outside research firms, and network partners. This first issue, “Decoding the Adversary,” focuses on whether or not you and your board of directors are doing enough to protect against cyber threats. Security is not simply a CIO, CSO, or IT department issue. Breaches, leaked documents, and cybersecurity attacks impact stock prices and competitive edge. It is a responsibility that must be shared amongst all employees, and CEOs and board members must proactively mitigate future challenges.
    [Show full text]
  • Security News Digest July 25, 2017
    Security News Digest July 25, 2017 Canada will remain where it is for a long time to come, but the Canada’s Security Scene Quiz will move to the Information Security Awareness previous quizzes page at the end of July. Watch this space for the August feature! August 1st is acknowledged across the globe as World Wide Web Day! World Wide Web Day, marks the birth of the Web in August 1990 at the Europe Laboratory for Particle Physics (CERN) in Switzerland. Tim Berners-Lee and Robert Cailliau developed a prototype Web browser and introduced Hypertext Markup Language, HTML. The first ever website was published on August 6, 1991 and served up a page explaining the World Wide Web project and giving information on how users could setup a web server and how to create their own websites and web pages, as well as how they could search the web for information. The URL for the first ever web page put up on the first ever website was http://info.cern.ch/hypertext/WWW/TheProject.html The World Wide Web ('WWW' or simply the 'Web') is a global information medium which users can read and write via computers connected to the Internet. The term [web] is often mistakenly used as a synonym for the Internet itself, but the Web is a service that operates over the Internet, just as e-mail also does. The history of the Internet dates back significantly further than that of the World Wide Web. On July 21st, the Google “Doodle” honoured Canadian Marshall McLuhan! [“the Medium is the Message”] Who is Marshall McLuhan? Meet the Canadian Media Theorist Who Predicted the Internet http://nationalpost.com/news/canada/who-is-marshall-mcluhan-how-a-canadian-media-theorist-predicted-the- internet/wcm/194cb7e2-e778-4780-9aba-6eb94831fcc5 Canadian professor Marshall McLuhan rose to prominence as a media theorist while teaching at the University of Toronto in the 1960s.
    [Show full text]
  • OSS: Using Online Scanning Services for Censorship Circumvention
    OSS: Using Online Scanning Services for Censorship Circumvention David Fifield1, Gabi Nakibly2, and Dan Boneh1 1 Computer Science Department, Stanford University 2 National EW Research & Simulation Center, Rafael { Advanced Defense Systems Ltd. Abstract. We introduce the concept of a web-based online scanning service, or OSS for short, and show that these OSSes can be covertly used as proxies in a censorship circumvention system. Such proxies are suitable both for short one-time rendezvous messages and bulk bidirectional data transport. We show that OSSes are widely available on the Internet and blocking all of them can be difficult and harmful. We measure the number of round trips and the amount of data that can be pushed through various OSSes and show that we can achieve throughputs of about 100 KB/sec. To demonstrate the effectiveness of our approach we built a system for censored users to communicate with blocked Tor relays using available OSS providers. We report on its design and performance. 1 Introduction Nowadays many nations regularly filter Internet traffic by blocking news sites, social networking sites, search sites, and even public mail sites like Gmail. The OpenNet Initiative, which tracks public reports of Internet filtering, lists a large number of countries that filter Internet traffic. Over half of the 74 countries tested in 2011 imposed some degree of filtering on the Internet [1]. In response, several proxy systems have emerged to help censored users freely browse the Internet. Most notable among these is Tor [2], which, while originally designed to provide anonymity, has also seen wide use in circumvention.
    [Show full text]
  • The Vulnerabilities of Developed States to Economic Cyber Warfare
    Working Paper The Vulnerabilities of Developed States to Economic Cyber Warfare Paul Cornish Head, International Security Programme and Carrington Professor of International Security, Chatham House June 2011 The views expressed in this document are the sole responsibility of the author(s) and do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author and Chatham House should be credited, preferably with the date of the publication. Working Paper: The Vulnerabilities of Developed States to Economic Cyber Warfare INTRODUCTION The central features of the ‘cybered’ world of the early 21st century are the interconnectedness of global communications, information and economic infrastructures and the dependence upon those infrastructures in order to govern, to do business or simply to live. There are a number of observations to be made of this world. First, it is still evolving. Economically developed societies are becoming ever more closely connected within themselves and with other, technologically advanced societies, and all are becoming increasingly dependent upon the rapid and reliable transmission of ideas, information and data. Second, where interconnectedness and dependency are not managed and mitigated by some form of security procedure, reversionary mode or redundancy system, then the result can only be a complex and vitally important communications system which is nevertheless vulnerable to information theft, financial electronic crime, malicious attack or infrastructure breakdown.
    [Show full text]
  • How to Analyze the Cyber Threat from Drones
    C O R P O R A T I O N KATHARINA LEY BEST, JON SCHMID, SHANE TIERNEY, JALAL AWAN, NAHOM M. BEYENE, MAYNARD A. HOLLIDAY, RAZA KHAN, KAREN LEE How to Analyze the Cyber Threat from Drones Background, Analysis Frameworks, and Analysis Tools For more information on this publication, visit www.rand.org/t/RR2972 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0287-5 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2020 RAND Corporation R® is a registered trademark. Cover design by Rick Penn-Kraus Cover images: drone, Kadmy - stock.adobe.com; data, Getty Images. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report explores the security implications of the rapid growth in unmanned aerial systems (UAS), focusing specifically on current and future vulnerabilities.
    [Show full text]
  • Fast Elliptic Curve Cryptography in Openssl
    Fast Elliptic Curve Cryptography in OpenSSL Emilia K¨asper1;2 1 Google 2 Katholieke Universiteit Leuven, ESAT/COSIC [email protected] Abstract. We present a 64-bit optimized implementation of the NIST and SECG-standardized elliptic curve P-224. Our implementation is fully integrated into OpenSSL 1.0.1: full TLS handshakes using a 1024-bit RSA certificate and ephemeral Elliptic Curve Diffie-Hellman key ex- change over P-224 now run at twice the speed of standard OpenSSL, while atomic elliptic curve operations are up to 4 times faster. In ad- dition, our implementation is immune to timing attacks|most notably, we show how to do small table look-ups in a cache-timing resistant way, allowing us to use precomputation. To put our results in context, we also discuss the various security-performance trade-offs available to TLS applications. Keywords: elliptic curve cryptography, OpenSSL, side-channel attacks, fast implementations 1 Introduction 1.1 Introduction to TLS Transport Layer Security (TLS), the successor to Secure Socket Layer (SSL), is a protocol for securing network communications. In its most common use, it is the \S" (standing for \Secure") in HTTPS. Two of the most popular open- source cryptographic libraries implementing SSL and TLS are OpenSSL [19] and Mozilla Network Security Services (NSS) [17]: OpenSSL is found in, e.g., the Apache-SSL secure web server, while NSS is used by Mozilla Firefox and Chrome web browsers, amongst others. TLS provides authentication between connecting parties, as well as encryp- tion of all transmitted content. Thus, before any application data is transmit- ted, peers perform authentication and key exchange in a TLS handshake.
    [Show full text]
  • Terminator Dark Fate Sequel
    Terminator Dark Fate Sequel Telesthetic Walsh withing: he wags his subzones loosely and nope. Moth-eaten Felice snarl choicely while Dell always lapidify his gregariousness magic inertly, he honours so inertly. Sometimes unsentenced Pate valuate her sacristan fussily, but draconian Oral demodulating tunelessly or lay-offs athletically. Want to keep up with breaking news? Schwarzenegger against a female Terminator, lacked the visceral urgency of the first two films. The Very Excellent Mr. TV and web series. Soundtrack Will Have You Floating Ho. Remember how he could run like the wind, and transform his hands into blades? When the characters talk about how the future is what you make, they are speaking against the logic of the plot rather than organically from it. 'Dark Fate' is our best 'Terminator' sequel in over 20 years. Record in GA event if ads are blocked. Interviews, commentary, and recommendations old and new. Make a donation to support our coverage. Schwarzenegger appears as the titular character but does not receive top billing. Gebru has been treated completely inappropriately, with intense disrespect, and she deserves an apology. Or did the discovery of future Skynet technology start a branching timeline where the apocalypse came via Cyberdyne instead of Skynet? Need help contacting your corporate administrator regarding your Rolling Stone Digital access? We know that dark fate sequel. Judgment Day could be a necessary event that is ultimately the only way to ensure the future of the human race. Beloved Brendan Fraser Movie Has Been Blowing Up On Stream. Underscore may be freely distributed under the MIT license.
    [Show full text]
  • Crypto Projects That Might Not Suck
    Crypto Projects that Might not Suck Steve Weis PrivateCore ! http://bit.ly/CryptoMightNotSuck #CryptoMightNotSuck Today’s Talk ! • Goal was to learn about new projects and who is working on them. ! • Projects marked with ☢ are experimental or are relatively new. ! • Tried to cite project owners or main contributors; sorry for omissions. ! Methodology • Unscientific survey of projects from Twitter and mailing lists ! • Excluded closed source projects & crypto currencies ! • Stats: • 1300 pageviews on submission form • 110 total nominations • 89 unique nominations • 32 mentioned today The People’s Choice • Open Whisper Systems: https://whispersystems.org/ • Moxie Marlinspike (@moxie) & open source community • Acquired by Twitter 2011 ! • TextSecure: Encrypt your texts and chat messages for Android • OTP-like forward security & Axolotl key racheting by @trevp__ • https://github.com/whispersystems/textsecure/ • RedPhone: Secure calling app for Android • ZRTP for key agreement, SRTP for call encryption • https://github.com/whispersystems/redphone/ Honorable Mention • ☢ Networking and Crypto Library (NaCl): http://nacl.cr.yp.to/ • Easy to use, high speed XSalsa20, Poly1305, Curve25519, etc • No dynamic memory allocation or data-dependent branches • DJ Bernstein (@hashbreaker), Tanja Lange (@hyperelliptic), Peter Schwabe (@cryptojedi) ! • ☢ libsodium: https://github.com/jedisct1/libsodium • Portable, cross-compatible NaCL • OpenDNS & Frank Denis (@jedisct1) The Old Standbys • Gnu Privacy Guard (GPG): https://www.gnupg.org/ • OpenSSH: http://www.openssh.com/
    [Show full text]