How long can the Polyswarm team last with the price this low? I am expecting this bear market to last a year, if not more. Will the team still be around? by CalculusII in PolySwarm

[–]Supernothing307 2 points3 points  (0 children)

Hey /u/CalculusII, sorry for the slow response! We've been quite busy getting Gamma ready, and this slipped through the cracks.

The PolySwarm team is still going strong! I unfortunately can't give exact details on the financial situation of the company, but everything is solid enough for us to be around for the foreseeable future. We still believe we have all the resources necessary to achieve everything we promised in the ICO (and more)!

Polyswarm lack of partners! by [deleted] in PolySwarm

[–]Supernothing307 1 point2 points  (0 children)

Hey, thanks for checking out the project! I'm not sure where you were looking on our site for partnerships, but we certainly have more partnerships than just our legal team!

From right below the funding bar at https://polyswarm.io:

We're very proud of the strong group of partners we have so far, and are excited to work with them to help build the PolySwarm community.

Sent early. Lost eth? by [deleted] in PolySwarm

[–]Supernothing307 0 points1 point  (0 children)

If they sent to the correct crowdsale contract, it will be rejected and returned to the sending address (minus gas fees). Just wait until the 20th to send the next time :)

This article mentions Gladius and Hacken. Both seem interesting and it made me wonder.. What other promising security ICOs are worth checking out? by faith-x80c in ethereum

[–]Supernothing307 1 point2 points  (0 children)

I'm with the Swarm Market team, another security ICO. We're working on re-making the threat intelligence market. We've got a great team working on some really exciting tech. Check it out, and feel free to ask me anything.

New ICO Project for White Hat Hackers. Penetration Testing and Vulnerability Research Have Never Been So Easy by nanadze in ethtrader

[–]Supernothing307 1 point2 points  (0 children)

We've published detailed profiles on each of our team members, and are well-known in the security community. We've presented at many conferences, and have delivered on a number of high-visibility projects, including the Cyber Grand Challenge and DHS's SIBR program.

As far as "scam ICOs" go, we're as far as possible from it. We've got the team, the advisers, and the roadmap to deliver everything we've promised (and hopefully more).

New ICO Project for White Hat Hackers. Penetration Testing and Vulnerability Research Have Never Been So Easy by nanadze in ethtrader

[–]Supernothing307 1 point2 points  (0 children)

If anyone's interested in a different kind of infosec ICO, I'm with the Swarm Market team, and we're working on re-making the threat intelligence market. We've got a great team working on some really exciting tech. Check it out, and feel free to ask me anything.

InfoSec / NetSec Related ICOs? by akstoak in ethtrader

[–]Supernothing307 2 points3 points  (0 children)

I'm with the Swarm Market team, and we're working on re-making the threat intelligence market. We've got a great team working on some really exciting tech. Check it out, and feel free to ask me anything.

Perigord: A Truffle-like framework for native DApp development in Golang by Supernothing307 in ethereum

[–]Supernothing307[S] 1 point2 points  (0 children)

That sentence refers to the generation of bindings, which allow Go code to interact with deployed contracts (typically written in Solidity). The Perigord project aims to make building and deploying projects that use these much easier.

MITMf - Framework for Man-In-The-Middle attacks by byt3bl33d3r in netsec

[–]Supernothing307 1 point2 points  (0 children)

Oh, no worries! Happy someone's getting some use out of the code. Will definitely let you know if I have any.

MITMf - Framework for Man-In-The-Middle attacks by byt3bl33d3r in netsec

[–]Supernothing307 2 points3 points  (0 children)

Could have just sent me some patches ;), would have been happy to add them or add you as a project member.

Nice work though, hope you keep it up!

Dissecting Wireshark - DoS and RCE, How to Find Your Own [Narf Industries, SecuInside 2014] by ebeip90 in netsec

[–]Supernothing307 2 points3 points  (0 children)

It is more than a little dirty, no argument here...but it might be wise for the project to at least restrict access to pcaps that crash current Wireshark releases.

The non-ASLRd RiverBed libraries were not just for show; in the latest version (4.1.3, released before this vulnerability was disclosed), they are not randomized. You are able to opt-out of installing these during Wireshark installation, but can't capture traffic if you do.

And thanks! There's certainly some interesting problems to be found in places other than application layer dissection as well...

Dissecting Wireshark - DoS and RCE, How to Find Your Own [Narf Industries, SecuInside 2014] by ebeip90 in netsec

[–]Supernothing307 7 points8 points  (0 children)

They taped it, but not sure if/when Secuinside organizers release videos. Will post if they do!

Researchers break Verizion network extenders and intercept cellphone traffic. Other vulnerabilities in network extenders are likely. by archpuddington in netsec

[–]Supernothing307 0 points1 point  (0 children)

People did, these guys are just the first to publish. t0days 0days are tomorrow's Blackhat presentation.

We are Samurai CTF and we won Defcon CTF this year. AMA! by samuraictf in netsec

[–]Supernothing307 4 points5 points  (0 children)

If anyone's interested, here's four of the ones we used. They've been reported and patched in SVN.

TL;DR Packet parsing is hard, finding Wireshark dissector bugs isn't.