Profile

Cover photo
Niels Provos
Works at Google
Attended University of Michigan
4,833 followers|1,755,314 views
AboutPostsCollectionsPhotosYouTube

Stream

Niels Provos

Shared publicly  - 
 
The Serpent in the Sword is a paper by Lee A Jones studying early medieval pattern-welded swords.   This video shows how to create a pattern-welded sword that actually has a serpent at its core.   The sword making process while using modern tools is similar to the ones employed by anglo-saxon or viking-age smiths.
14
1
Schweißtechnik Sebastian Windhagen's profile photo
Add a comment...

Niels Provos

Shared publicly  - 
 
"The former director of the Central Intelligence Agency and the National Security Agency said this week that the government should not have a backdoor into encrypted communications.

“America is more secure with end-to-end unbreakable encryption,” said General Michael Hayden, now a principal of the security and risk management firm Chertoff Group, speaking at a Wall Street Journal conference."
“America is more secure with end-to-end unbreakable encryption,” he said.
13
1
Patrick Steed's profile photo
Add a comment...

Niels Provos

Shared publicly  - 
10
3
Patrick Steed's profile photoJon Disnard's profile photo
Add a comment...

Niels Provos

Shared publicly  - 
 
"The developer community has been searching for alternatives, and with some success. A set of solutions now offer a more efficient iOS app deployment experience, giving app developers the ability to update their code as they see fit and deploy patches to users’ devices immediately. While these technologies provide a more autonomous development experience, they do not meet the same security standards that Apple has attempted to maintain. Worse, these methods might be the Achilles heel to the walled garden of Apple’s App Store."
What are the security risks of iOS apps? While some alternative solutions make it more efficient for developers ito update their apps, they don't meet the strict security standards Apple has in place, which could lead to comp...
7
3
Patrick Steed's profile photoFlorian Kriener's profile photo
Add a comment...

Niels Provos

Shared publicly  - 
 
"IT WAS THE talk most anticipated at this year’s inaugural Usenix Enigma security conference in San Francisco and one that even the other speakers were eager to hear."
The nation's hacker-in-chief took up the ironic task at the Enigma Conference in San Francisco.
14
3
Dimi 7's profile photoCeline Bursztein (Cealtea)'s profile photoSarai Pahla (AokageHime)'s profile photoTheSenseiNL's profile photo
Dimi 7
 
Ha. Cute but doesn't excuse what they've done and are still doing.
Add a comment...

Niels Provos

Shared publicly  - 
 
"The state's Attorney General apparently would like the Baltimore PD's use of pen register orders to remain standard operating procedure. According to a brief filed in a criminal case relying on the warrantless deployment of an IMSI catcher (in this case a Hailstorm), the state believes there's no reason for police to seek a warrant because everyone "knows" cell phones generate data when they're turned on or in use."
3
4
Larry Fine's profile photoНатан Линн's profile photo
Add a comment...

Niels Provos

Shared publicly  - 
9
2
John Wong's profile photoKristian Hermansen's profile photoMichael Safyan's profile photoDenis Sinegubko's profile photo
3 comments
 
But Google failed...searching [firefox download] right now on google results in malware.
Add a comment...
Have him in circles
4,833 people
Bitcoin Serbia's profile photo
David D's profile photo
Raffaele “Haruki” Procentese's profile photo
chirag ramvani's profile photo
Michael Durwin's profile photo
ben miled bilel's profile photo
Don Hydra (4SO)'s profile photo
victor bellec's profile photo
Leon Vale's profile photo

Niels Provos

Shared publicly  - 
6
1
Art Imp's profile photoPatrick Steed's profile photo
Art Imp
 
Great research
Add a comment...

Niels Provos

Shared publicly  - 
 
"... You may have encountered social engineering in a deceptive download button, or an image ad that falsely claims your system is out of date. Today, we’re expanding Safe Browsing protection to protect you from such deceptive embedded content, like social engineering ads."
35
5
Karl French's profile photoKim Halavakoski's profile photoHarald Wagener (oliof)'s profile photoRank Badjin's profile photo
 
Bravo ! Anyone who has played Scrabble on an Android phone has no doubt seen plenty of phishing pop-ups. Hope these can finally be suppressed.
Add a comment...

Niels Provos

Shared publicly  - 
 
"From his role as the Chief of NSA's Tailored Access Operation, home of the hackers at NSA, Mr. Joyce will talk about the security practices and capabilities that most effectively frustrate people seeking to exploit networks."
8
3
Kim Halavakoski's profile photoAlexandre Keledjian's profile photo
Add a comment...

Niels Provos

Shared publicly  - 
 
No binary blobs?
The First Privacy Respecting Laptops Two Models, Unlimited Freedom. The Librem 13 and the Librem 15 laptops from Purism. Buy Now @ Crowd Supply. Aligned Beliefs. We believe what you believe. When you use a Purism computer you know you are operating the best hardware and software that always has ...
3
John Ruble's profile photoRobert Edmonds's profile photoJon Disnard's profile photoGrant Grundler's profile photo
5 comments
 
+Jon Disnard Agreed. It's why I have been pushing mfg's to use signed blobs for firmware and have their firmware check signatures to make sure it's not been tampered with. (Ideally at every "reboot" too...but just getting them to check blob signatures at update would be a huge improvement).

While this sounds exactly the opposite of "Free and Open Source", it's being honest that every desktop, tablet, and phone shipped today almost certainly has more than 5 firmware blobs running on something other than the host CPU. E.g.: eMMC/sata (controller and storage device), Wifi, Cellular, touch, EC, SMM, TPM, and then the world of USB devices: webcams, storage, Ethernet, printers, etc.
Add a comment...

Niels Provos

Shared publicly  - 
 
As a security conscious user who follows the best practices like: using unique passwords, 2FA, only using a secure compu…
26
21
Jo Hastings's profile photoYuri Gonzalez's profile photoBen Morgan's profile photoMarco Leogrande's profile photo
Add a comment...
Niels's Collections
People
Have him in circles
4,833 people
Bitcoin Serbia's profile photo
David D's profile photo
Raffaele “Haruki” Procentese's profile photo
chirag ramvani's profile photo
Michael Durwin's profile photo
ben miled bilel's profile photo
Don Hydra (4SO)'s profile photo
victor bellec's profile photo
Leon Vale's profile photo
Education
  • University of Michigan
    Computer Science, 1998 - 2003
  • Universität Hamburg
    Mathematik, 1992 - 1998
Story
Introduction
Niels Provos received a Ph.D. from the University of Michigan in 2003, where he studied experimental and theoretical aspects of computer and network security. He is one of the OpenSSH creators and known for his security work on OpenBSD. He developed Honeyd, a popular open source honeypot platform; SpyBye, a client honeypot that helps web masters to detect malware on their web pages; and many other tools such as Systrace and Stegdetect. He is a member of the Honeynet Project and an active contributor to open source projects. Provos is currently employed as distinguished engineer at Google, Inc. When not working with computers, he forges steel into swords.

This is my personal G+ profile. The views expressed here are mine alone and not those of my employer. 
Work
Occupation
Software Engineer
Employment
  • Google
    Software Engineer, present
Basic Information
Gender
Male