Talks/Webcasts
Tweets, Beats, and Sheets: C2 Over Social Media
In which I discuss how to control malware using Twitter, Soundcloud, Google Sheets, and Salesforce.
Link: https://www.blackhillsinfosec.com/webcast-tweets-beats-and-sheets-c2-over-social-media/
Social Media C2
The original talk about the sneaky-creeper social media C2 library at BSides Las Vegas.
Link: https://www.youtube.com/watch?v=tLkQH-ev2iw
There’s a companion blog post here if you want more detail.
Monitoring Social Media in 5 Minutes a Week
Introducing my pushpin-web project, which collects and displays geotagged social media in areas the user specifies. This was at SOURCE Boston 2015.
Link: https://www.youtube.com/watch?v=yvSx0z9bMxA&list=PLrbUElixkHvarXr3QPSjSIfwnMh6IkRhC&index=3
Total Recoll
Talking about my adventures setting up and using Recoll for OSINT work (specifically, sifting through the leaked NSA documents looking for project codenames). This was in the DEF CON 25 recon village.
Link: https://www.youtube.com/watch?v=uPbDySi-p2w&list=PLrbUElixkHvarXr3QPSjSIfwnMh6IkRhC
There’s a companion blog post here if you want more information.
Papers
Security of the Near Field Communication Protocol
I published this as a senior in high school, so go easy on me.
Click/touch/tap/glare menacingly at the expandy box below if you want to see the abstract.
Link: https://dl.acm.org/citation.cfm?id=2535418.2535432
Particularly Good Blog Posts
Steganography: The Art and Science of Hiding Things in Other Things
A series of blog posts introducing steganography and Hamming error-correction codes. Fun to write, and I like to think it’s fun to read (and informative). Plus it has somewhere in the neighborhood of a million pictures of a super floofy puppy so honestly what more do you want from me.