In my last post I have elaborated multiple reasons as to why someone would want to bypass a Firewall. Now that this is established, here comes the part where we get to the “how”.
This is the first post of many, in which I will touch the topic of bypassing Firewalls. This being the Introduction of this Series, I will focus on setting the topic up, providing explanations and all that stuff [...]
Trust is good, cryptography is better Recently, I have seen a lot of people in the InfoSec- and Online Privacy Community having lenghty discussions about which companies we can trust these days. In this article I write about why I think this isn't the right approach we should take [...]