TPM – How the integrity of the system configuration is guaranteed if the PCR hash is overwritten on each "Measurement"?

In the TPM architecture, we know that after a "Measurement" procedure is performed, it is followed by a "PCR Extend" procedure, in which the resulting system configuration metrics data (20 bytes) are appended to the val… Continue reading TPM – How the integrity of the system configuration is guaranteed if the PCR hash is overwritten on each "Measurement"?

Posted in TPM

How did ntpd got pacthed to prevent NTP time synchronization attacks?

I recently tested the NTP Time Synchronization Attack as desribed and demonstrated by Jose Selvi in 2015.
Basically, the attack was mostly used to send the victim’s clock in the future, so the already cached HTTP Strict Transport Security … Continue reading How did ntpd got pacthed to prevent NTP time synchronization attacks?

Are photos on Facebook servers stored with the geotagging metadata in their EXIF headers?

If i download photo from Facebook, will i be able to read its geotagging metadata, or Facebook just parse the uploaded photo, record all EXIF headers into the database (to show the camera model somewhere or to provide them to law enforceme… Continue reading Are photos on Facebook servers stored with the geotagging metadata in their EXIF headers?