è±èªçè¨äºãæ¥æ¬èªã¸æ©æ¢°ç¿»è¨³ãããã¼ã¸ã§ã³ï¼Google翻訳ï¼ã ä¸ãä¸ç¿»è¨³ã®æãããã¨ãã¦æ©æ¢°ç¿»è¨³ãç¨ããå ´åã翻訳è ã¯å¿ ã翻訳å åæãåç §ãã¦æ©æ¢°ç¿»è¨³ã®èª¤ããè¨æ£ããæ£ç¢ºãªç¿»è¨³ã«ããªããã°ãªãã¾ããããããæããã¦ããªãå ´åãè¨äºã¯åé¤ã®æ¹éG-3ã«åºã¥ããåé¤ãããå¯è½æ§ãããã¾ãã ä¿¡é ¼æ§ãä½ãã¾ãã¯ä½åè³ªãªæç« ã翻訳ããªãã§ãã ãããããå¯è½ãªãã°ãæç« ãä»è¨èªçè¨äºã«ç¤ºãããæç®ã§æ£ãããã©ããã確èªãã¦ãã ããã å±¥æ´ç¶æ¿ãè¡ããããè¦ç´æ¬ã«ç¿»è¨³å ã¨ãªã£ãè¨äºã®ãã¼ã¸åã»çã«ã¤ãã¦è¨è¿°ããå¿ è¦ãããã¾ããè¨è¿°æ¹æ³ã«ã¤ãã¦ã¯ãWikipedia:翻訳ã®ã¬ã¤ãã©ã¤ã³#è¦ç´æ¬ã¸ã®è¨å ¥ãåç §ãã ããã 翻訳å¾ã{{翻訳åç¥|en|PRISM (surveillance program)|â¦}}ããã¼ãã«è¿½å ãããã¨ãã§ãã¾ãã Wikipedia:翻訳ã®ã¬ã¤ãã©ã¤ã³ã«ããã詳細ãªç¿»è¨³
Trusted Computer System Evaluation Criteriaãéç§°ãªã¬ã³ã¸ããã¯(Orange Book)ã¨ã¯ãã¢ã¡ãªã«ã®å½å®¶å®å ¨ä¿éå±(NSA)ã®éº¾ä¸(ãã)ã®NCSC(National Computer Security Center)ã¨è¨ãçµç¹ãçºè¡ãã¦ãããã»ãã¥ãªãã£è©ä¾¡åºæºã®ã¬ã¤ãã©ã¤ã³ã®ãã¨ã ã¾ããã»ãã¥ãªãã£ã¬ãã«ã4段éã«åãã¦ãããããããã®ã¬ãã«æ¯ã«ãæºãããªããã°ãªããªãæ¡ä»¶ãå®ãããã¦ããã
Ghidraï¼ã®ãã©ã [ËÉ¡iËdrÉ][3]ï¼ã¯ãã¢ã¡ãªã«å½å®¶å®å ¨ä¿éå±ï¼NSAï¼ã«ãã£ã¦éçºããããªã¼ãã³ã½ã¼ã¹ã®ãªãã¼ã¹ã¨ã³ã¸ãã¢ãªã³ã°ãã¼ã«ã§ãããå®è¡ãã¤ããªã¯2019å¹´3æã® RSAã«ã³ãã¡ã¬ã³ã¹ã§å ¬éãããã½ã¼ã¹ã³ã¼ãã¯1ãæå¾ã«GitHubã§å ¬éããã[4]ãGhidraã¯å¤ãã®ã»ãã¥ãªãã£ç ç©¶è ã«ãã£ã¦IDA Proã®ç«¶åç¸æã¨ã¿ãªããã¦ãã[5]ãã¾ããGUIç¨ã®Swingã使ç¨ãã¦Javaã§ä½æããã¦ãããéã³ã³ãã¤ã©ã®é¨åã¯C++ã§è¨è¿°ããã¦ãããããã¹ã¿ã³ãã¢ãã³å½¢å¼ã§ä½¿ç¨ã§ãã[注é 1]ã Ghidraã使ç¨ãã¦èªååæãå®è¡ããã¹ã¯ãªããã¯ãJavaã¾ãã¯Pythonï¼Jythonçµç±ï¼ã§ä½æã§ãã[6][7]ããã ãããã®æ©è½ã¯æ¡å¼µå¯è½ã§ãããã³ãã¥ããã£ãã©ã°ã¤ã³ãä»ãã¦ä»ã®ããã°ã©ãã³ã°è¨èªã§ã使ã§ãã[8]ãGhidraã«æ°ããæ©è½ã追å ãããã©
è¦å¯åºåã³å é£ãµã¤ãã¼ã»ãã¥ãªãã£ã»ã³ã¿ã¼ï¼NISCï¼ã¯ãç±³å½å®¶å®å ¨ä¿éå±ï¼NSAï¼ãç±³é£é¦ææ»å±ï¼FBIï¼åã³ç±³å½åå®å ¨ä¿éçãµã¤ãã¼ã»ãã¥ãªãã£ã»ã¤ã³ãã©åºï¼CISAï¼ã¨ã¨ãã«ãä¸å½ãèæ¯ã¨ãããµã¤ãã¼æ»æã°ã«ã¼ããBlackTechãï¼ãã©ãã¯ããã¯ï¼ã«ãããµã¤ãã¼æ»æã«é¢ããååã®æ³¨æåèµ·ãçºåºãã¾ããã ä¸å½ãèæ¯ã¨ãããµã¤ãã¼æ»æã°ã«ã¼ãBlackTechã«ãããµã¤ãã¼æ»æã«ã¤ãã¦ï¼æ³¨æåèµ·ï¼ People's Republic of China-Linked Cyber Actors Hide in Router Firmware åã®ãã¼ã¸ã«æ»ã
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scri
XKeyscoreï¼ã¨ãã¯ã¹ãã¼ã¹ã³ã¢ï¼ã¯ãä¸çä¸ã®å¤å½äººã«é¢ããã¤ã³ã¿ã¼ãããä¸ã®ãã¼ã¿ãæ¤ç´¢ã»åæããããã«ç±³å½å½å®¶å®å ¨ä¿éå±ï¼NSAï¼ã使ç¨ããå æ¥µç§ã³ã³ãã¥ã¼ã¿ã»ã·ã¹ãã ã§ããããã®ããã°ã©ã ã¯ããªã¼ã¹ãã©ãªã¢ã®å½é²ä¿¡å·å±ï¼DSDï¼ããã¥ã¼ã¸ã¼ã©ã³ãã®æ¿åºéä¿¡ä¿å®å±ï¼GCSBï¼ãªã©ã¨å ±åéå¶ããã¦ããããã®åå¨ã¯ã2013å¹´7æã«ç±³å½äººã§ãã¼ãºã»ã¢ã¬ã³ã»ããã«ãã³ç¤¾ã®å 徿¥å¡ã¨ãã¯ã¼ãã»ã¹ãã¼ãã³ã«ãã£ã¦æ´é²ããã[1]ã ãã®ããã°ã©ã ã®åå¨ã¯ã2013å¹´7æãå é¨åçºè ã¨ãã¯ã¼ãã»ã¹ãã¼ãã³ã«ãã£ã¦ã·ããã¼ã»ã¢ã¼ãã³ã°ã»ãã©ã«ãç´ããã³ãªã»ã°ããï¼O Globoï¼ç´ä¸ã§åãã¦æ´é²ããããã ããã®ã³ã¼ããã¼ã ã¯ãã以åã®è¨äºã«ãæ²è¼ããã¦ãããã¾ãä»ã®å¤ãã®ã³ã¼ããã¼ã ã¨åæ§ã«ç¤¾å å ¬åã徿¥å¡ã®ãªã³ã©ã¤ã³å±¥æ´æ¸ã§ãè¦ããã¨ãã§ãã[2][3]ããªã»ã°ããç´ã«ããã¨ãXKeysco
N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say WASHINGTON â The trail that led American officials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most impenetrable targets on earth. Spurred by
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to
In room-size metal boxes Âsecure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world. According to documents provided by former NSA contractor Edward Snowden, the effort to build "a cryptologically useful quantum computer" â a mac
Reuters reported last month on a secret $10 million contract between RSA and the NSA. Allegedly, RSA, an encryption pioneer that is now a division of EMC, took a $10 million payment for making a specific NSA-developed algorithm the default method for generating random numbers in one of their security products. Documents leaked by former NSA contractor Edward Snowden suggest that the NSA included a
NSA surveillance program reaches âinto the pastâ to retrieve, replay phone calls The National Security Agency has built a surveillance system capable of recording â100 percentâ of a foreign countryâs telephone calls, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. The Post's Ashkan Soltani, who broke the story with Barton Gellman,
SAN FRANCISCO (Reuters) - Edward Snowdenâs unprecedented exposure of U.S. technology companiesâ close collaboration with national intelligence agencies, widely expected to damage the industryâs financial performance abroad, may actually end up helping. The application icons of Facebook, Twitter and Google are displayed on an iPhone next to an earphone set in this illustration photo taken in Berlin
SAN FRANCISCO (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and p
SAN FRANCISCO (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and p
ã¹ãã¼ãã³ï½¢ã·ãªã¢å ¨åã®ãããã鮿ããã®ã¯NSAãçè´ã®ã¯ãã¿ã§ãã£ããï½£2014.08.15 11:30 satomi çã£ã¦ãããããã·ãªã¢ã 2å¹´è¿ãåã«ã·ãªã¢å ¨åã§ã¤ã³ã¿ã¼ãããã鮿ãããä»¶ãå½å ã®ãããç¶æ³ãããã·ãªã¢æ¿åºããã®äºä»¶ãå¼ãèµ·ãããã¨æãããã®ã§ãããå®ã¯ç±³å½å®¶å®å ¨ä¿éå±ï¼NSAï¼ã®ä»æ¥ã ã£ãã¨ãã¡ã¬ãªã¼ã«ã¼ã®ã¨ãã¯ã¼ãã»ã¹ãã¼ãã³ãWiredææ°ã¤ã³ã¿ã´ã¥ã¼ã§è©±ãã¦ã¾ãã NSAã¯å æ¦ã®ã·ãªã¢æ å¢ã«æ¢ããå ¥ãããããã·ãªã¢å½å æå¤§ï¼ãã¤äºå®ä¸å¯ä¸ï¼ã®ISPã«ããã¯ãã¢ãããããããã¨ä¼ãã§ããããã§ããï½¢ãã®ããã¯ãã¢ããè¨å®ããã°ã·ãªã¢å½å ã®ãã¸ã¿ã«éä¿¡ã¯ã»ã¼å ¨é¨ã¢ã¡ãªã«ã«çæãã¨ãããæªæ¾æã®æ å ±ã¢ã¯ã»ã¹ãææ¡ã§ãããã¢ã¡ãªã«ã¯è«å ±ã§å§åçãªåªä½ãå¾ãã¯ãã ã£ãï½£ï¼TIMEã®Wiredã®è¨äºè¦ç´ããï¼ ã¨ããããã©ã³éãã«äºã¯é²ã¿ã¾ããã§ãããã©ããã©ãé
A slide from an internal NSA presentation indicating that the agency uses at least one Google cookie as a way to identify targets for exploitation. (Washington Post) The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using "cookies" and location data to pinpoint targets for government hacking and to bolster surveillance. The agen
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}