The hottest Forensics Substack posts right now

And their main takeaways
Category
Top Science Topics
Culture Study 3847 implied HN points 29 Jan 25
  1. Marty Goddard played a key role in creating the rape kit, which helped provide evidence of sexual assault. This changed how incidents were taken seriously in the legal system.
  2. The history of the rape kit shows that many women were not believed when they reported assaults. It highlights a culture that often dismissed survivors.
  3. This story also reveals how women's contributions can be overlooked in innovation. Even when they create important tools, men often get the credit.
Grey Goose Chronicles 727 implied HN points 09 May 23
  1. Native Americans were using horses over a hundred years before previously thought, shaping a new view of early Plains societies.
  2. Genetic analysis confirms migration and intermixing with Persians on Africa's Swahili coast, challenging long-held theories.
  3. Bronze Age Menorca revealed evidence of the use of powerful drugs, shedding light on ancient rituals and practices.
Cybersect 137 implied HN points 10 Jul 23
  1. To take a forensics image of Hunter Biden's laptop drive, a similar model MacBook Pro is needed with a non-standard hard-drive connector.
  2. Experts can provide inaccurate opinions when not directly involved or without thorough research.
  3. Asking techies to comment without detailed work can lead to biased conclusions and contribute to the spread of conspiracy theories.
Get a weekly roundup of the best Substack posts, by hacker news affinity:
Rhythms of Research 58 implied HN points 17 Sep 23
  1. Not all observables listed in threat intel reporting should be labeled as 'IOCs', as many of them don't indicate compromise.
  2. The distinction between IOCs and non-IOCs in threat hunting can help make threat intel reports more actionable for organizations.
  3. Differentiating between internally-focused threat detection (IOCs) and externally-focused threat hunting (exothrunting) observables can enhance threat detection efforts.
Thái | Hacker | Kỹ sư tin tặc 139 implied HN points 02 May 12
  1. Information security is a broad field with many areas of expertise, so it's important to choose a focus that interests you.
  2. Key roles in information security include product security, operations security, applied security, and threat analysis.
  3. To excel in information security, developing strong programming skills, mastering tools like IDA Pro, and understanding concepts in areas like cryptography and network security are essential.
Logging the World 1 HN point 14 Mar 23
  1. Pi Day can be annoying for some mathematicians due to the overemphasis on the beauty of the Pi formula and memorizing digits of Pi.
  2. The beauty in mathematics is not just about formulas like Pi, but also in the precise form of logical arguments and the way pieces fit together like a complex mechanism.
  3. Fourier analysis, involving Fourier transform and harmonics, is a powerful tool used in various scientific fields beyond Pi Day celebrations.
Thái | Hacker | Kỹ sư tin tặc 19 implied HN points 12 Nov 06
  1. The incident of Huyremy, known as 'hacker number 1 in Vietnam,' sparked a heated debate in the IT community regarding the evidence presented by C15 and Huyremy's denial.
  2. The legal aspect highlights the responsibility of the owner of the computer and internet connection used in the cyber crime incident, emphasizing the need to provide evidence to prove innocence.
  3. C15 demonstrated expertise in computer forensics, raising doubts about Huyremy's claim of being a top hacker due to the evidence left behind.
Thái | Hacker | Kỹ sư tin tặc 0 implied HN points 12 Nov 06
  1. Prioritize encryption to protect your privacy and ensure security. Make use of tools like Tor to anonymize internet traffic and defend against network surveillance.
  2. Securely deleting data is critical. Traditional methods like formatting a hard drive or overwriting data may not be effective. Consider encryption to ensure data destruction without physically tampering with drives.
  3. Implement a layered approach to security, including encryption of various files and using different passwords for different websites. Be cautious and understand that true safety comes from avoiding illegal activities.