New Zealand – 3 Weeks on the Te Araroa Trail

Back in 2013, I joined for one month a couple of friends hiking the Te Araroa Trail southbound. We met close to the trail head of the Whanganui River where you basically need to rent canoes in order to go down the river until you reach the ocean close to the town of Whanganui. The river was relatively calm in this section, but should never be underestimated since heavy rain can let grow quickly. (Further upstream, you can obviously find nice spots for packrafting.)

Continue reading New Zealand – 3 Weeks on the Te Araroa Trail

On the Risk of Connecting and Collecting it All

The past has shown and the present demonstrates in an impressive way that protecting sensitive assets is hard – if not even impossible. Too many companies fail to protect their customer’s information properly and this situation will continue in the future. Normally, after a breach, the InfoSec community preaches that additional security controls need to be implemented: strong passwords should be picked by users and hacked ones need to be changed, 2-factor-authentication should be used, patches need to be implemented, data needs to be encrypted and many more.

Continue reading On the Risk of Connecting and Collecting it All

Accessing a usb-sys blocked and encrypted Qubes OS Partition

Since a USB controller assignment survives reboot, you may find yourself unable to access your system. (link)

Qubes OS does consider all USB devices by default as potentially evil. So in case you are serious about USB-based attacks on your Qubes-OS environment, you might want to install an USB qube such as sys-usb. Continue reading Accessing a usb-sys blocked and encrypted Qubes OS Partition

desert hiker & packrafting enthusiast & interest in information security