Good Debate

Tech, Travel, and Projects by a student of life

Bio Implants: Pros and Cons

Bio Implants: Pros and Cons Ever since a friend of mine got a Bio implant in 2016, I’ve wanted one as well. There’s different types, but the 2 main ones are NFC and RFID based. The time finally came in May 2019 at Circle City Con, where there was a nurse from California who was offering to insert the xEM RFID Chip for $60, which was the cheapest I had seen offered and I could do it in Indiana instead of going to the coasts where most certified nurses are.

Docker, React, and Security

Docker, React, and Security React Docker Git Installing Docker Security Using Docker Hub Useful Docker Commands Lessons from Docker Docker Machine Troubleshooting This post has been constructed over the course of roughly 4 months, and was done with my friend Zach as independent research in docker security related to dockerizing react web apps. All the code can be found in the repo on Github.

Applied Neural Networks

Classifying Drones based on Sound Frequency From January to March of this year, I worked with students from Chungnam National University (충남대학교) in South Korean in research regarding Neural Networks. Specifically, we wanted to create a Convolutional Neural Network that could classify different types of drones and whether they were carrying a payload or not using low cost microphones. The purpose of this system was focused on providing law enforcement or military support in identifying if drones were carrying bombs in high density population environments.

Python Development Environment

Python Development Environment I set out to create an extensible, portable python development that would be consistent if I moved it between operating environments and architectures. When I first set out on this project, I wanted to use Docker to deploy a dev environment on top of a Debian based system. I didn’t realize this when I started, nor did Google seem to know that Docker isn’t meant for a dev environment, only for pushing about apps after they’re made.

Failed Building Wheel for Cryptography

This post was originally going to be about how to set up a few different systems, including vagrant, docker, ansible, and some random python projects on debian/ubuntu systems, but I ran into a singular problem on almost everything I did. The error was always Failed Building Wheel for Cryptography I’ve gotten this problem several times, and it can be caused by different things. I found a few posts that helped me (here and here and here), but here is a quick summary which should help you in almost all situations:

A Week Without Work

A week without work So last week was spring break, and I travelled to sunny southern Florida without my computer or phone. This was the first time since I started working on computers 8 years ago that I’ve gone without it for more than a day or two. It was an experience, but I wouldn’t do it again. I’ve gone without my phone for over a month before, and I didn’t mind.

Improving the School System

Improving the School System I recently came across an essay I wrote my senior year in high school entitled “How to improve the educational system”. This is one of the longest essays I’ve ever written at 5400 words, but it wasn’t for a class. I wrote the paper because I felt it would help improve the system if the right people read it. It was well received and made its way up the ladder, unfortunately not much came of it.

Announcements in March

Announcing the Strategic Intelligence Network, TLS, and Banned Ebooks Note: you can find the SIN and BEb on the menu in the lower left As promised (and implemented roughly 2 weeks ago), this site now services all direct content through TLS using Let’s Encrypt. The implementation was surprisingly easy, although I didn’t find a quick guide on their site, digitalocean had a very easy and quick 5 minute installation. Some images are still over http, but I’m not as concerned about that at the moment, and will spend that small amount of effort elsewhere.

Data Collection & Ethics

Data Collection & Ethics ​ Note: This article might seem odd, it was an assignment for a class that I thought was well written enough to post here. It’s a long form ethical post. Enjoy ​ Data collection is an important and highly relevant topic in the modern age. People have wrestled with the degree to which companies control user data for decades, and the world is final starting to see 3 major breaks in ideology.

Scripts Sites and School

Scripts Sites and School February already! It’s been just over a month since my last post. Don’t be mistaken though, I currently have 4 articles waiting to edit including Finding and fixing rouge ‘smart’ routers on an enterprise network Installing and setting up the Skylines Project Part 1 of the Fuzzing series A long-form article about ethics in data collection, retention, and analysis. Now you may be thinking that’s a lot of articles to have waiting for editing and you’d be right; I enjoy writing, I do not enjoy editing.

Monero and BTC Prices Surge

Cryptocurrency prices surge Many people have noticed the price of Bitcoin increasing dramatically over the past few months, which has clearly been due to its increased popularity in China as the yuan has fallen. What many have not noticed, though, is the extremely high growth of Monero in the past month. When I first heard about Monero in July, its price had recently jumped to $1.50. I knew it was extremely useful as a real private cyrptocurrency, unlike bitcoin, so it was popular within the criminal culture.

Get Started Hacking

If you want to hack (all the things) In my last post, I told my story about how I started hacking. Hopefully that made you want to learn too, so I made the honorary ‘How to start hacking’ post. The following are tips when starting out that I wish I knew, as sometimes it’s hard to figure out what you should be learning. Google As stated, googling is the most important thing you can do.

Why I started Hacking

Why I started hacking I thought I’d write this because of the number of questions I get about how I got started hacking, so here’s the story: *Note: infosec and cybersecurity are used interchangeably. I started ‘hacking’ when I was 12 years old. I got an Xbox 360 the year before, and loved playing Call of Duty. After about a year, it started getting a little boring, but one day I joined a random game, which happened to be a ‘10th prestige lobby’, or a hacked lobby.

Kali in VirtualBox

Setting up Kali using VirtualBox So this short blog post is about setting up Kali in VirtualBox. I had a few problems with networking, but the process is overall very straight forward. There are various guides out there, but it seems there are almost always unaddressed issues. At first I actually tried in VMware, but couldn’t quite get the networking right. VirtualBox just turned out to be easier, and VirtualBox seems easier to work with from a Vagrant perspective, which is also a huge bonus.

Welcome

Welcome! This blog has been revamped using Hugo, a static site generator. Keep an eye out for all things hacking. Mostly offensive, sometimes defensive if I know how to fix things that are broken. You can find me on twitter and github, and can read about me some on the about page. Thanks for checking out the blog! Time to get back to work Austin