Introduction
Statistics
Contact
Development
Disclaimer
Help
petergarner.net gopher root
-- Cyber(space), Technical and Internet related ---------------------
Microsoft: Carbon-aware computing: Measuring and reducing the carbon footprint …
Digitally enhanced brochure for the 1984 Apple Mac 128k computer
Android 101: prepared for the US Court
International Standards for Automatic Exchange of Information in Tax Matters: C…
NCTC Report: Terrorist and Militant Attacks on Electricity Infrastructure Conti…
The attack against Danish, critical infrastructure
The Specops Weak Password Report 2023
-- Reports by CCDH: Center for Countering Digital Hate -
-- a controversial Think Tank. All opinions their own.
CCDH: Why platforms must act on twelve leading online anti-vaxxers
CCDH: How ten fringe publishers fuel 69% of digital climate change denial
CCDH: TikTok pushes harmful content promoting eating disorders and self-harm in…
CCDH: How big tech powers and profits from David Icke's lies and hate, and why …
CCDH: How Google profits by cleaning Big Oil's reputation
CCDH: How Google profits from anti-choice ads distorting searches for reproduct…
CCDH: How Iran's press TV uses social media to promote anti-Jewish hatred
CCDH: Submission to the White House Sept 2022
CCDH: How Twitter makes millions from anti-LGBTQ+ rhetoric
CCDH: Report prepared for UK Parliament Public Bill Committee, Online Safety Bi…
Cyber threat report: UK Charity Sector (NCSC)
Kevin Mitnick's statement to the US Senate: Cyber Attack: Is the Government Saf…
Thoughts on child safety on commodity platforms
SECURING PRIVACY - Privacy International on End-to-End Encryption
Draft Indian Telecommunication Bill, 2022
Tandy M100 service manual
Escalation Risks of Intelligence Loss from Countercyber Operations in Crisis
Soviet Computer Software and Applications in the 1980s
Australian High Court rules against Google: hyperlinking is not publishing
Sensitive Court Procedures Following SolarWinds Breach
The Surreal Case of a C.I.A Hacker's Revenge
Cyber Intelligence - Danchev Memoir
Those Unspoken Thoughts: A study of censorship and media freedom in Manipur, In…
A taxonomy of internet shutdowns the technologies behind network interference
Privacy International's report "Personal data and competition: Mapping perspect…
Extended Analysis of “How Child Welfare Workers Reduce Racial Disparities in …
FBI: Ransomware Attacks on Agricultural Cooperatives Potentially Timed to Criti…
Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure A…
Lapsus$, Okta and the Health Sector
Apple's whitelist of auto-completable domains in iOS (JSON format)
So, you want to be a Darkweb Drug Lord...
The Microft Password Guide
THE 2022 WEAK PASSWORD REPORT: An annual investigative look at the state of pas…
What Data Do The Google Dialer and Messages Apps On Android Send to Google?
A Researcher’s Guide to Some Legal Risks of Security Research October 2020
St Louis Post-Dispatch publishes report re Missouri Governor Mike Parson's vow …
2014: Xerox scanners/photocopiers randomly alter numbers in scanned documents (…
This World of Ours: James Mickens, Usenix August 2012
Does Transparency in Moderation Really Matter: User Behavior After Content Remo…
2022/02/03 1408 Coll vs. Google Ruling on disclosure of legal funding arrangeme…
Wearing Many Hats: the Rise of the Professional Security Hacker: Goerzen, Colem…
"The Unix Time-sharing System" the 1978 BSTJ update of the 1974 C. ACM article …
"The Evolution of the Unix Time-sharing System": an account of developments dur…
"A Stream Input/Output System" from AT&T Bell Laboratories Technical Journal, 1…
"Variable-size Arrays in C" a proposal of Richie's that appeared in Journal of …
"Recent Changes to C": from the 7th Edition manual
The version of the C Reference Manual that came with 6th Edition Unix (May 1975…
"Interprocess Communication in the Ninth Edition Unix System" with D. L. Presot…
OPT/Israel: Six Palestinian human rights defenders hacked with NSO Group’s Pe…
Bugs in our Pockets: The Risks of Client-Side Scanning
Virtual Worlds, Real People: Human Rights in the Metaverse
Re: Google Digital Advertising Antitrust Litigation (2nd Complaint) - Jury Tri…
CENTER FOR THE STUDY OF THE DRONE AT BARD COLLEGE: The Drone Database - March 2…
CENTER FOR THE STUDY OF THE DRONE AT BARD COLLEGE: The Drone Database
Advisoryreport on the Surveillance Legislation Amendment-IdentifyandDisrupt-Bil…
-- Google whistleblower Zach Vorhies walked out 950 pages of Google
internal documents to the Department of Justice anti trust
division detailing Google's extensive censorship project.
This project is called "Machine Learning Fairness", which has
already corrupted Google Search, YouTube and News products.
This, along with various black lists and secret page rank scores
is being used by Google to manipulate public opinion according
to a hidden agenda. Enjoy!
AI-with-the-best fairness presentation
Algorithmic Discrimination from an Environmental Psychology Perspective Stress-…
Allegations of Algorithmic Bias Investigation and Meta-Analysis
Attorney-Client Privileged_ Cloud DEI 2018 Planning
BUSINESS Multicultural capacity framework - Robbins 2014 - rev. 4-11-17
Comms doc Fairness in machine learning
Deck for participants- 2016-08 Serving Under-Represented Users in Recommenders …
DeepMind MTV - Introduction to Equality, Diversity and Inclusion - Grow
Definition of Algorithmic Unfairness - PRIVILEGED
Expanding Collaboration for News Quality
Fair is not the default (go fair-not-default)
Feeding WebSpam manual actions to News (Design Doc)
Fwd Fake News-letter 11 27 - Efforts to combat spread of (mis/dis)information…
go-ml-fairness
Metrics and Measurements for Algorithmic Fairness in Machine Learning - Privile…
ML Fairness
ML Fairness-resources
Page level domain restrction 2017_10_02 US Las-Vegas Attack Deadliest Us Mass S…
Privileged Confidential - ML Fairness Communication Best Practices
Realtime Boost - DesignDoc
RealtimeBoost Events DesignDoc
Realtime Events - preso
RMI Diversity Summit - Blaise 15m version (yes really)
Search - Accelerated Mobile Pages (AMP) - Grow
Seeds of Change- Root causes of algorithmic unfairness, and a path forward
Sojourn - people
The data on diversity - December 1, 2015
Training Global Google efforts to address Fake News - 2016 Q4
Twiddler Quick Start Guide - Superroot
Unconscious Bias Cheat Sheet (for Perf) - Google Docs
Unconscious Bias @ Work (Self Study Video) - Grow
YouTube controversial query blacklist
Google Leaks: Censorship Exposed: Zach Vorhies' Site
-- A fine collection of Technically-oriented PDFs (Papers, Specs,
-- Decks, Manuals, etc) compiled by Trent Nelson and dehain.
-- Visit the full collection at https://github.com/tpn/pdfs
The TPN Technical PDF Collection
--
United States of America v Joseph James O’Connor Case No.3:21-mj-70812 MAG
Divsion of local government and school accountability: Watervliet School IT Rep…
Divsion of local government and school accountability: Westhill Central School …
Facebook's Coordinated Inauthentic Behavior Report June 2021
John McAfee - died today - Wikipedia as at 2012-06-24
APPLICATION FOR SEARCH WARRANT re An0m.pdf
Pretty Good Phone Privacy: Schmitt, Raghavan
Privacy Implications of Accelerometer Data: Kröger, Raschke, Bhuiyan
The Commodore 64 Home Companion
An Introduction to Ray-Tracing - Morgan Kauffman
The Hitchhiker’s Guide to Online Anonymity v0.6.6
Apple: A Day in the Life of Your Data
Cease and Desist letter from NPCC to Paul Moore re Cyberalarm software
Taylor et al. vs Google Case 5:20-cv-07956
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
International Statement: End-To-End Encryption and Public Safety, OPA, DOJ
Reform Think Tank-Resilient public services in an age of cyber threats
Telecom Regulatory Authority of India: Highlights of subscription data 20200731
Microsoft Digital Defense Report 2020 September (30Mb)
Competition document:Unmanned Air Systems in Urban Environments (MOD)
CISA - Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity
Multilateral Mutual Assistance & Cooperation Framework for Competition Authorit…
A Guide to the IBM 3033 Processor, AP and MP Complex
Linux Productivity Tools (Ketan M, Oak Ridge National Laboratory)
Technical,Legal Review of the Stopp Corona App by the Austrian Red Cross
Terbium Labs: Data: The Business World's Most Vulnerable Commodity
Do Cookie Banners Respect my Choice - Matte,Bielova,Santos
Root DNSSEC KSK Ceremony 403
Snowden's Permanent Record - Chinese CN edition with underlined redactions
Investigation into the Use of Data-analytics in Political Campaigns: final 2018…
Description of 1,027,871 images from 50,000unique hotels around the world datas…
Rollback an apt-get upgrade if something goes wrong on Debian / Ubuntu Linux
Internet accessible devices; obscenity filtering (State of Arizona)
Security and Privacy in Computer Systems (Willis H Ware Apri 1967)
Integrating Artificial Intelligence into Weapon Systems
Defendent Apple Inc's Motion To Dismiss Plaintiffs' 2nd Amended Complaint (batt…
The Cyber Security Body Of Knowledge v1.0
Google Report: The Hunt for 3ve
Ofcom: UK Communications Market Report 2018
Robust Website Fingerprinting Through the Cache Occupancy Channel
UK’s Critical National Infrastructure Third Report of Session 2017–19
ATM logic attacks: scenarios
Audit of the acute kidney injury detection system known as Streams Royal Free L…
Apple T2 Security Chip Security Overview October 2018
Consultation on revised assessment arrangements for GCSE computer science
After the Reboot - Computing Education in UK Schools
Self-encrypting deception: weaknesses in the encryption of solid state drives
The Case for the Web - a proposed charter for Netizens
Taamneh vs Twitter
China Telecom's BGP Hijacking
Code of Practice for Consumer IoT Security Oct 2018
onsumer_Guidance_for_Smart_Devices_in_the_Home_Oct_2018
Mapping of IoT: Security Recommendations,Guidance,Standards Oct 2018
Insight Intelligent Technology Index 2018
The Stroz Report
Google vs Levandowski: engineer went to Uber
Accelerating Wireline Broadband Deployment by Removing Barriers to Infrastructu…
City_of_Philadelphia_Comments_to_Draft
FCC FACILITATES DEPLOYMENT OF WIRELESS INFRASTRUCTURE FOR 5G CONNECTIVITY
Migrating an old Mac Mini work environment to a Raspberry Pi
Yet Another Wireless Access Project (YARWAP): Billy Nomad
Machine Learning Algorithms and Police Decision-Making: Legal, Ethical and Regu…
OpenEMR v5.0.1.3 - Vulnerability Report - Project Insecurity - insecurity.sh
The MSB 2018 Virus Situation as of 3oth July 2018 by Eric Wyatt
Open Rights Group: Age Verification Briefing 08/2018
Under The Hoodie - pentesting 2018 report
Teach 'em to Phish - Privacy International report
Are your cookies telling your fortune: analysis of weak cookie secrets and OSINT
Stuxnet: (how to) kill a centrifuge
The AWK Programming Language (1988)
Related to British Board of Film Censors (BBFC) in their role as
Managers of the UK Government Age Verification System for adult
websites.
BBFC: Draft Guidance on Age-verification Arrangements and Draft Guidance on Anc…
BBFC: UPDATED Draft Guidance On Age Verification Arrangements, Draft Guidance O…
BBFC: Guidance on Age-verification Arrangements Submitted to the Secretary of S…
BBFC: Memorandum of understanding between the ICO and BBFC
BBFC: Memorandum of understanding between the IWF and BBFC
Speakers notes from the Defcon 25 conference in Las Vegas
DEFCON 25: 0ctane Untrustworthy Hardware
DEFCON 25: Alvaro Munoz JSON attacks
DEFCON 25: Andrew Robbins and Will Schroeder An Ace Up The Sleeve
DEFCON 25: Artem Kondratenko Cisco Catalyst Exploitation
DEFCON 25: Ayoul3 Dealing the Perfect Hand Shuffling memory blocks on zOS
DEFCON 25: Caleb Madrigal IOT Hacking With SDR
DEFCON 25: Chris Thompson MS Just Gave The Blue Teams Tactical Nukes
DEFCON 25: Christopher Domas Breaking The x86 ISA
DEFCON 25: Cincvolflt Inside The Meet Desai Attack
DEFCON 25: Damien Cauquil Weaponizing the BBC MicroBit
DEFCON 25: Daniel Bohannon and Lee Holmes Revoke Obfuscation
DEFCON 25: Datko and Quartier Breaking Bitcoin Hardware Wallets
DEFCON 25: Dhia Mahjoub and Thomas Mathew Malicious CDNs Identifying Zbot Domai…
DEFCON 25: Foofus Secret Tools Learning About Gov Surveillance Software
DEFCON 25: Gabriel Ryan Advanced Wireless Attacks Against Enterprise Networks C…
DEFCON 25: Gabriel Ryan Advanced Wireless Attacks Against Enterprise Networks L…
DEFCON 25: Gabriel Ryan Advanced Wireless Attacks Against Enterprise Networks
DEFCON 25: Gerald Steere and Sean Metcalf Hacking the Cloud
DEFCON 25: Gil Cohen Call The Plumber You Have A Leak In Your (named) Pipe
DEFCON 25: Hanno Boeck Abusing Certificate Transparency Logs
DEFCON 25: Haoqi Shan and Jian Yuan Man in the NFC
DEFCON 25: Hernandez Richards MacDonald Evoy Tracking Spies in the Skies
DEFCON 25: Hyrum Anderson Evading Next Gen AV Using AI
DEFCON 25: Ilja van Sprundel BSD Kern Vulns
DEFCON 25: Inbar and Eden Story of Early Israeli Hacking Community
DEFCON 25: Jesse Michael and Mickey Shkatov Driving Down the Rabbit Hole
Baloch: Bypassing Browser Security Policies For Fun And Profit
The State of Surveillance in 2018 - BigBrotherWatch
ICANN: WHOIS, GDPR Article 29 working party memo
ICANN: Proposed temporary spec of gTLD registration data
Phrack Magazine: Attacking JavaScript Engines
Julian Assange's statement November 14/15th 2016
ONS Report: Internet Access Households & Individuals 2016
Information Security for Journalists v1.3
BBS Lists: Os/2 BBS
"What would you like to see to see most in Minix?" A question by some guy calle…
D1 COMMSEC - Elisabeth de Leeuw - Unformation in the Era of Hyper Connectivity
D1 COMMSEC - Marc Newlin - Applying Regulatory Data to IoT RF Reverse Engineeri…
D1 COMMSEC - Martin Knobloch - Dont Feed the Hippos
D1 COMMSEC - Nadav Markus and Gal De Leon - Exploiting GLIBC - Hacking Everythi…
D2 COMMSEC - Mattijs van Ommeren - A Series Of Unfortunate Events - Where Malwa…
D1T1 - Jacob Torrey - Using the Observer Effect and Cyber Fengshui
D1T1 - Lin Huang - Forcing a Targeted LTE Cellphone into an Eavesdropping Netwo…
D1T1 - Nick Biasini - Exploit Kits - Hunting the Hunters
D1T1 - Radu Caragea - Peering into the Depths of TLS Traffic in Real Time
D1T1 - Shengping Wang and Xu Liu - Escape From The Docker-KVM-QEMU Machine
D1T1 - Tang Qing Hao - Virtualization System Vulnerability Discovery Framework
D1T2 - Broderick Aquilino and Wayne Low - Kernel Exploit Hunting and Mitigation
D1T2 - Chilik Tamir - Profiting from iOS Malware
D1T2 - Michele Spagnuolo and Lukas Weichselbaum - CSP Oddities
D1T2 - Tim Xia - Adaptive Android Kernel Live Patching
D1T2 - Yann Allain and Julien Moinard - Hardsploit Project
D1T3 - Gustavo Grieco - Vulnerability Discovery Using Machine Learning
D1T3 LABS - Anto Joseph - Droid-FF
D2T1 - Anders Fogh - Cache Side Channel Attacks
D2T1 - Felix Wilhelm - Attacking Next Generation Firewalls
D2T1 - Jun Li - CANSsee - An Automobile Intrusion Detection System
D2T1 - Yuwei Zheng and Haoqi Shan - Forging a Wireless Time Signal to Attack NT…
D2T1 Itzik Kotler and Amit Klein - The Perfect Exfiltration Technique
D2T2 - Mikhail Egorov and Sergey Soldatov - New Methods for Exploiting ORM Inje…
D2T2 - Peter blasty Geissler - Breaking Naive ESSID WPA2 Key Generation Algorit…
D2T2 - Richard Johnson - Go Speed Tracer - Guided Fuzzing
D2T2 - Shangcong Luan - Xen Hypervisor VM Escape
D2T2 - Wish Wu - Perf - From Profiling to Kernel Exploiting
D2T3 LABS - Matteo Beccaro - Electronic Access Control Security
KEYNOTE 1 - John Adams - Beyond FBI v Apple
KEYNOTE 2 - Adam Laurie - The Future Has Arrived and its Effin Hilarious
The rise and fall of the Gopher protocol-MinnPost
CLOSING KEYNOTE - Sophia D Antoine - Hardware Side Channels in Virtualized Envi…
Assange: "Google is not what it seems"
Do You See What I see? Differential of Anonymous Users
The Dutch Government Position on Encryption [original Dutch].txt
The Dutch Government Position on Encryption [machine_translated].txt
Don't throw away your old_boarding pass
Government Cellphone Surveillance Equipment Catalogue
Kazakhstan Telecom notifies on introduction of national security certificate fr…
Perl 6 Introduction
Megaupload: the Copyright Lobby and the Future of Digital Rights
Megaupload: Affidavit of Lawrence Lessig September 2015
Covert Communication in Mobile Applications 2015
NSA Journal of Information Warfare 2015
NSA Journal of Information Warfare 2014
EFF Report on colour printers that watermark each doc printed
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
TOR browser forensics on Windows OS (short).pdf
Microsoft: a History of Anticompetitive Behaviour and Consumer Harm (2009)
The Web's Shadiest (TLD) Neighbourhoods
Wifi Bedouin - Julian Bleecker's project that spawned the PirateBox
Location Tracking using Mobile Device Power Analysis
Equation Group: questions and answers. Report by Kaspersky
SOHO Pharming: a Team Cymru report on the scale of home/SOHO router exploits
Draft Declaration of Internet Rghts
"Chattering Laptops" - think you're anonymous? Er, no
The (real) Matrix - via The Hidden Wiki
A Question of Momentum - Critical Reflections on Individual Options for Surveil…
Understanding Counter-surveillance as Critical Discourse and Practice.pdf
POST note discussing the state of UK data encryption in 2006
POST note discussing Tor, the Dark Net and Online Anonymity
142,635,139 emails inspected by Mimecast; report
Western Australian Auditor General’s Report: IT systems 2018
A collection of *nix Sysadmin Test Questions and Answers for Interview/Exam (20…
PHP 4.0 documentation as big html
A framework for progressive engagement of staff in cyber security
Why Johnny Can’t Encrypt-Usability Evaluation of PGP 5.0
Why Johnny -Still- Can’t Encrypt Evaluating the Usability of a Modern PGP_Cli…
Bitreich.org Gopherish-themed radio interview
Google Data Collection: Professor Douglas C Schmidt Professor of Computer Scien…
The Linux distro family tree
How Perl Saved the Human Genome Project.txt
Understanding and Characterizing Interception of the DNS Resolution Path
Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infra…
Freeing the Web from the Browser: Revisiting Open Hypermedia (Savage, J: Univer…
A Two-Phase Usability Study of the FIDO U2F Security Key
Do a robot’s social skills and its objection discourage it being switched off…
Easy-read guide to LED safety
Potential Human Health Risks of LEDs - Sheer, Final
Results of public consultation on Scheer's preliminary opinion on LEDs
ERP Applications Under Fire - Onapsis - July 2018
FTC Consumer Sentinel Data Book 2017 - Fraud, Theft Report
The 8 Fallacies of Distributed Computing
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
Forensic Analysis and Anonymisation of Printed Documents
Identification and Obfuscation of Social Media Users using metadata
The Commodore 64 design from 1985
Deceived by design: User Interface Dark Patterns (Google, Facebook)
Inference Attacks by Malicious Batteries on Mobile Devices
Experimental Security Assessment of BMW Cars by KeenLab (summary).pdf
Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels (draft…
A PDF containing an overview and alphabetical listing of Windows commands
Center for Internet Security Benchmark: Debian 1.0 2007
BBC:Microbit A quick-start guide for Teachers
State Considered Harmful: a proposal for a stateless laptop - Rutkowska
Intel X86 Considered Harmful - Rutkowska
Dennis Yurichev's incredible guide to Reverse-Engineering
Reverse Engineering for Beginners: full version, A4 size
Reverse Engineering for Beginners: lite version, A4 size
Reverse Engineering for Beginners: full version, A5 (ebook) size
Reverse Engineering for Beginners: lite version, A5 (ebook) size
SSH Mastery: OpenSSH, PUTTY, Tunnels and Keys by Michael W Lucas
Using malware for money? Read this "study on incentivizing users to ignore secu…
Linux ate my RAM!! Er, not really..
NSA Converged Analysis of Smartphone Devices (May 2010)
Purpose of the Best1_User account created by the BMC Performance Assurance inst…
Spoiled Onions: Exposing Malicious Tor Exit Relays
Raspberry Pi verified peripherals Jan 2014
The essential GPG crib sheet
A Howto guide for Linux and Open Source software
Linux essentials: the complete introduction
User Guide for the original Mac Mini PPC
UK Crypto Laws 2013
What hard drive should I buy - via Backblaze blog
The original Billy Nomad Project notes from 2004
Uniform Resource Identifier (URI) Schemes
Meulie.net Gopher Proxy Statistics (we're in there!)
Proxy List
Full list of free, public, forward proxy servers (updated daily)
List of free, public, forward proxy servers (updated daily) JUST THE IP+PORT
IETF RFCs
Citations for all RFCs in numeric order (updated daily)
RFC1436 - The Internet Gopher Protocol
RFC2378 - The CCSO Nameserver (Ph) Architecture
RFC4266 - The Gopher URI scheme
UPDATED OFTEN
Ages of MAC addresses scraped from the web (CSV)