Enumerated in the “Fourteen Points” style:
Embrace technology but don’t become it. Radical human augmentation via technological means will be a downgrade not an upgrade. Technology is exponential but humans are linear (and should remain so)
Whatever can be digitized, automated and virtualized, will be – and anything that cannot be digitized or automated will become extremely valuable (i.e. our uniquely human qualities).
Exponential technological change is #hellven (heaven and hell at the same time). Will we be tool-makers or tool-made?
Technology does not have ethics but our society depends on them. Just because we can does not mean we should.
Technology is not what we seek but how we seek: the tools should not become the purpose. Yet increasingly, technology is leading us to ‘forget ourselves’.
Efficiency should never become more important than humanity, because not everything that can be automated, should be – and happiness cannot be automated.
Humanity will change more in the next 20 years than the previous 300 years (yes, seriously). It’s time to decide what we want to be.
To safeguard humanity’s future, we must invest as many resources in human happiness and the continued flourishing of humanity as we do in developing new tools and technologies. Exponential technologies need exponential humanity; every great algorithm needs a great androrithm!
We are at the pivot point of exponential and combinatorial technological evolution: all around us, science fiction is becoming science fact – and the future will increasingly arrive gradually then suddenly. We need to proceed with a very wise combination of precaution and pro-action.
The immediate future clearly is all about technology yet the bigger future lies in transcending it
It is now clear that indeed, ‘software is eating the world’ (Marc Andreessen, 2011) but increasingly I am worried about the possibility that ‘software is cheating the world’
Silicon Valley and China should not become ‘mission control for humanity‘. We need a global digital ethics counsel that transcends the agenda of investors and the military.
Just as peace is not merely the absence of war, progress is not merely the presence of technology (in other words, technology is not the saviour of humanity – we are!)
The future is not just something that will happen tomorrow, the future is something that has already happened today but just didn’t notice it!
Pastor Manul Laphroaig curates PoC||GTFO with a fine gang of friends and neighbors. Many of his essays are featured in the book, including “Epistle to Hats of All Colors,” “Sermon on the Divinity of Languages,” and “Build Your Own Fucking Birdfeeder.”
Photos are mock-ups.
Table of Contents
A CFP with POC
iPod Antiforensics” by Travis Goodspeed
ELFs are dorky, Elves are cool” by S. Bratus and J. Bangert
Epistle to Hats of All Colors” by Manul Laphroaig
Returning from ELF to Libc” by Rebecca .Bx Shapiro
GTFO or #FAIL” by FX of Phenoelit
Proceedings of the Society of PoC||GTFO
Serena Butler’s TV Typewriter” by Travis Goodspeed
Making a Multi-Windows PE” by Ange Albertini
This ZIP is also a PDF” by Julia Wolf
Burning a Phone” by Josh Thomas
Sermon on the Divinity of Languages” by Manul Laphroaig
The Children’s Bible Coloring Book of PoC||GTFO
Build your own birdfeeder” by Manul Laphroaig
A PGP Matryoshka Doll” by Myron Aub
Code Execution on a Tamagotchi” by Natalie Silvanovich
Shellcode for MSP430” by Travis Goodspeed
Calling putchar() from ELF” by Rebecca .Bx Shapiro
POKE of Death for the TRS 80/M100” by Dave Weinstein
This OS is also a PDF” by Ange Albertini
A Vulnerability in Reduced Dakarand” by Joernchen
Juggernauty” by Ben Nagy
Address on the Smashing of Idols to Bits and Bytes
Greybeard’s Luck” by Manul Laphroaig
This PDF is JPEG.” by Ange Albertini
Netwatch for SMM” by Wise and Potter
Packet-in-Packet Mitigation Bypass” by Travis Goodspeed
An RDRAND Backdoor in Bochs” by Taylor Hornby
Kosher Firmware for the Nokia 2720” by Assaf Nativ
Tetranglix Boot Sector” by Haverinen, Shepherd, and Sethi
Defusing the Qualcomm Dragon” by Josh Thomas
Tales of Python’s Encoding” by Frederik Braun
Angecryption” by Albertini and Aumasson
Tract de la Société Secrète
Epistle on the Bountiful Seeds of 0Day” by Manul Laphroaig
This OS is a Boot Sector” by Shikhin Sethi
Prince of PoC” by Peter Ferrie
New Facedancer Framework” by Gil
Power Glitching Tamagotchi” by Natalie Silvanovich
A Plausibly Deniable Cryptosystem’ by Evan Sultanik
Hardening Pin Tumbler Locks” by Deviant Ollam
Intro to Chip Decapsulation” by Travis Goodspeed
Forget Not the Humble Timing Attack” by Colin O’Flynn
This Truecrypt is a PDF” by Ange Albertini
How to Manually Attach a File to a PDF” by Ange Albertini
Ode to ECB” by Ben Nagy
Address to the Inhabitants of Earth
A Sermon on Hacker Privilege” by Manul Laphroaig
ECB: Electronic Coloring Book” by Philippe Teuwen
An Easter Egg in PCI Express” by Jacob Torrey
A Flash PDF Polyglot” by Alex Inführ
This Multiprocessing OS is a Boot Sector” by Shikhin Sethi
A Breakout Board for Mini-PCIe” by Joe FitzPatrick
Prototyping a generic x86 backdoor in Bochs” by Matilda
Your Cisco blade is booting PoC||GTFO” by Mik
I am my own NOP Sled” by Brainsmoke
Abusing JSONP with Rosetta Flash” by Michele Spagnuolo
Sexy collision PoCs” by A. Albertini and M. Eichlseder
Ancestral Voices” by Ben Nagy
Old Timey Exploitation
On Giving Thanks” by Manul Laphroaig
Gekko the Dolphin” by Fiora
This TAR archive is a PDF!” By Ange Albertini
X86 Alchemy and Smuggling” by Micah Elizabeth Scott
Detecting MIPS Emulation” by Craig Heffner
More Cryptographic Coloring Books” by Philippe Teuwen
PCB Reverse Engineering” by Joe Grand
Davinci Seal” by Ryan O’Neill
Observable Metrics” by Don A. Bailey
PoC||GTFO, Calisthenics and Orthodontia
The Magic Number: 0xAA55” by Morgan Reece
Coastermelt” by Micah Elizabeth Scott
The Lysenko Sermon” by Manul Laphroaig
When Scapy is too high-level” by Eric Davisson
Abusing file formats” by Ange Albertini
AES-NI Backdoors” by BSDaemon and Pirata
Innovations with Linux core files” by Ryan O’Neill
Bambaata speaks from the past” by Count Bambaata
Cyber Criminal’s Song” by Ben Nagy
Exploits Sit Lonely on the Shelf
Witches, Warlocks, and Wassenaar” by Manul Laphroaig
Compiler Bug Backdoors” by Bauer, Cuoq, and Regehr
A Protocol for Leibowitz by Goodspeed and Muur
Jiggling into a New Attack Vector” by Mickey Shkatov
Hypervisor Exploit, Five Years Old” by DJC and Bittman
<quote>Dr. Dunckley has found that everyday use of interactive screen devices — such as computers, video games, smartphones, and tablets — can easily overstimulate a child’s nervous system, triggering a variety of stubborn symptoms. In contrast, she’s discovered that a strict, extended electronic fast single-handedly improves mood, focus, sleep, and behavior, regardless of the child’s diagnosis. It also reduces the need for medication and renders other treatments more effective. </quote>
disrupts sleep and desynchronizes the body clock.
desensitizes the brain’s reward system.
induces stress reactions.
overloads the sensory system
depletes mental reserves.
reduces physical activity levels
reduces exposure to “green time.”
<quote ref=”amazon“>The first wave saw AOL and other companies lay the foundation for consumers to connect to the Internet. The second wave saw companies like Google and Facebook build on top of the Internet to create search and social networking capabilities, while apps like Snapchat and Instagram leverage the smartphone revolution. Now, Case argues, we’re entering the Third Wave: a period in which entrepreneurs will vastly transform major “real world” sectors like health, education, transportation, energy, and food—and in the process change the way we live our daily lives. But success in the Third Wave will require a different skill set, and Case outlines the path forward.</quote>
Sure feels like the end of the bubble. Here is a chronicle of generalized boosterism of the scale of George Gilder’s Telecosm
The Next Wave in the Internet’s Evolution; Steve Case; In The Wall Street Journal (WSJ); 2016-04-04.
Teaser: First came getting people online. Then the apps era took over. Now a fresh reimagining is taking off. Mentions
too big to fail
Financial Technology (FinTech)
First Wave → internet portals; e.g. AOL.
Second Wave → applications & services on top of the internet.
Third Wave → something about ubiquity
coopetition (a neologism of cooperation & competition)
<quote>The FTC has not found a way to police data brokers. Data brokers both create new privacy problems and intensify existing ones by offering mechanisms to secretly identify consumers and to link their otherwise pseudonymous behavior. The market provides little incentive for data brokers to recognize individuals’ privacy interests.</quote>
holder in due course rule
Relationships with staff may be more important than links to commissioners.
It is possible to persuade the FTC to drop an investigation.
A pugilistic posture does not help.
To see around the corners, it pays to be familiar with the FTC’s other divisions.
What I Learned When I Tried Being Authentic At Work; Ash Read; In Fast Company; 2016-01-22.
Teaser: Studies found that more than half of us cover up part of our identity to fit in at work, so what does it take to be authentic at work?
Ash Read is a content farmistcrafter, on staff at Buffer.
We Are What We Choose (Baccalaureate Remarks); Jeff Bezos; At Princeton University; 2010-05-30.
tl;dr → Yettanother speech on Life Lesssons from a Success Model; Whereas Life is about Choices, you should choose Success, as did he.
Source of the aphorism <quote>Will you be clever at the expense of others, or will you be kind?</quote>