Update for 04-05-22 16:15
This commit is contained in:
parent
3705b2634e
commit
4057eed1aa
BIN
Ideas.md.gpg
BIN
Ideas.md.gpg
Binary file not shown.
6
tech/PRISM.wiki
Normal file
6
tech/PRISM.wiki
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
= PRISM =
|
||||||
|
|
||||||
|
PRISM is the code name for a program implemented by the NSA for collecting
|
||||||
|
internet communications from various US companies. Because most of the data
|
||||||
|
flowing in the world passes through the USA, the NSA intercepts it and collects
|
||||||
|
it.
|
8
tech/XKeyscore.wiki
Normal file
8
tech/XKeyscore.wiki
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
= XKeyscore =
|
||||||
|
|
||||||
|
XKeyscore aka XKS is a computer system used by the NSA for searching and
|
||||||
|
analyzing global internet data, which is collected in real time. This system is
|
||||||
|
shared with australians, canadians, new zealand, britian, japan, and germany.
|
||||||
|
|
||||||
|
This system allows an operative to query terrabytes of data to find and track
|
||||||
|
individuals.
|
@ -4,22 +4,26 @@ Tools useful for security, either offensive or defensive
|
|||||||
|
|
||||||
---------------------------------------
|
---------------------------------------
|
||||||
|
|
||||||
|
== Government ==
|
||||||
|
|
||||||
|
* [[cia-do-dont]]
|
||||||
|
* [[PRISM]]
|
||||||
|
* [[XKeyscore]]
|
||||||
|
|
||||||
== Cryptology ==
|
== Cryptology ==
|
||||||
|
|
||||||
Hiding information
|
Hiding information
|
||||||
|
|
||||||
* [[cia-do-dont]]
|
|
||||||
|
|
||||||
=== Ciphers ===
|
=== Ciphers ===
|
||||||
|
|
||||||
==== Symetric Ciphers ====
|
==== Symmetric Ciphers ====
|
||||||
|
|
||||||
* [[substitution|Substitution]]
|
* [[substitution|Substitution]]
|
||||||
* [[Affine]]
|
* [[Affine]]
|
||||||
* [[DES]]
|
* [[DES]]
|
||||||
* [[AES]]
|
* [[AES]]
|
||||||
|
|
||||||
==== Asymetric Ciphers ====
|
==== Asymmetric Ciphers ====
|
||||||
|
|
||||||
* [[RSA]]
|
* [[RSA]]
|
||||||
* [[Diffie_Hellman]]
|
* [[Diffie_Hellman]]
|
||||||
@ -65,9 +69,4 @@ is the ip address of a device inside of the target network
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
[[index.wiki]]
|
[[index.wiki]]
|
||||||
|
Loading…
Reference in New Issue
Block a user