{"id":266,"date":"2015-05-07T07:22:55","date_gmt":"2015-05-07T07:22:55","guid":{"rendered":"https:\/\/melangedmaculateme.wordpress.com\/2015\/05\/07\/meet-the-darpa-backed-hackers-building-a-google\/"},"modified":"2023-07-28T16:25:13","modified_gmt":"2023-07-28T20:25:13","slug":"meet-the-darpa-backed-hackers-building-a-google","status":"publish","type":"post","link":"https:\/\/melange.dmaculate.me\/home\/2015\/05\/07\/meet-the-darpa-backed-hackers-building-a-google\/","title":{"rendered":"Meet The Darpa-Backed Hackers Building A Google For Every Web Weakness"},"content":{"rendered":"<p><a href=\"https:\/\/www.punkspider.org\" target=\"_blank\" rel=\"noopener\">https:\/\/www.punkspider.org<\/a><\/p>\n<p>\u201dThe goal is to provide free information to website users and owners regarding website security status.\u201c<\/p>\n<p><a href='http:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/05\/06\/punkspider-google-for-all-web-vulnerabilities\/'>Meet The Darpa-Backed Hackers Building A Google For Every Web Weakness<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/www.punkspider.org \u201dThe goal is to provide free information to website users and owners regarding website security status.\u201c Meet The Darpa-Backed Hackers Building A Google For Every Web Weakness<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"link","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[285,349,396],"class_list":["post-266","post","type-post","status-publish","format-link","hentry","category-uncategorized","tag-punkspider","tag-technology","tag-web-security","post_format-post-format-link"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":88,"url":"https:\/\/melange.dmaculate.me\/home\/2016\/10\/21\/google-has-quietly-dropped-ban-on-personally\/","url_meta":{"origin":266,"position":0},"title":"Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking &#8211; ProPublica","author":"aslam","date":"October 21, 2016","format":"link","excerpt":"Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking - ProPublica","rel":"","context":"In \"Google\"","block_context":{"text":"Google","link":"https:\/\/melange.dmaculate.me\/home\/tag\/google\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1450,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/09\/11\/treat-hackers-as-organized-criminals-says\/","url_meta":{"origin":266,"position":1},"title":"Treat Hackers As Organized Criminals, Says Government","author":"aslam","date":"September 11, 2011","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesObama administration seeks tougher penalties for cybercrime, but legal experts warn that current, imprecise proposals could be too widely applied.Show original","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1166,"url":"https:\/\/melange.dmaculate.me\/home\/2012\/01\/14\/report-says-canada-moving-towards-a-surveillance\/","url_meta":{"origin":266,"position":2},"title":"Report says Canada moving towards a surveillance society with \u201cLawful Access\u201d proposals","author":"aslam","date":"January 14, 2012","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesThe report also finds that the proposal to require all telecommunications service providers to provide \u201cback doors\u201d into their systems that the police can use for surveillance jeopardizes the security of telecommunications systems and heightens the risk of exploitation by hackers.Via bccla.org","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":353,"url":"https:\/\/melange.dmaculate.me\/home\/2014\/12\/18\/google-online-security-blog-an-update-to\/","url_meta":{"origin":266,"position":3},"title":"Google Online Security Blog: An Update to End-To-End","author":"aslam","date":"December 18, 2014","format":"link","excerpt":"The Chrome extension for OpenPGP encrypted Gmail is now on GitHub.Google Online Security Blog: An Update to End-To-End","rel":"","context":"In \"Gmail\"","block_context":{"text":"Gmail","link":"https:\/\/melange.dmaculate.me\/home\/tag\/gmail\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1800,"url":"https:\/\/melange.dmaculate.me\/home\/2018\/08\/23\/the-justice-department-is-trying-to-have-it-both-ways-its-ok-for-mueller-to-publicly-release-this-information-in-an-attempt-to-prosecute-alleged-russian-hackers-because-its-in-the-p\/","url_meta":{"origin":266,"position":4},"title":"The Government\u2019s Argument that Reality Winner Harmed National Security Doesn\u2019t Hold Up. Here\u2019s Why.","author":"aslam","date":"August 23, 2018","format":false,"excerpt":"https:\/\/theintercept.com\/2018\/08\/23\/reality-winner-sentenced-leak-election-hacking The real Deep State... WHISTLEBLOWER REALITY WINNER was officially sentenced to 63 months in prison on Thursday, after a federal judge rubber-stamped a plea deal already agreed to by the prosecution and Winner\u2019s lawyers. As the prosecution acknowledged, it is the longest sentence for a journalist\u2019s source in federal\u2026","rel":"","context":"In \"DOJ\"","block_context":{"text":"DOJ","link":"https:\/\/melange.dmaculate.me\/home\/tag\/doj\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/melange.dmaculate.me\/wp-content\/uploads\/sites\/2\/2018\/08\/rw-chambers-1535041654.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/melange.dmaculate.me\/wp-content\/uploads\/sites\/2\/2018\/08\/rw-chambers-1535041654.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/melange.dmaculate.me\/wp-content\/uploads\/sites\/2\/2018\/08\/rw-chambers-1535041654.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/melange.dmaculate.me\/wp-content\/uploads\/sites\/2\/2018\/08\/rw-chambers-1535041654.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":259,"url":"https:\/\/melange.dmaculate.me\/home\/2015\/05\/21\/todays-terrifying-web-security-vulnerability\/","url_meta":{"origin":266,"position":5},"title":"Today&#8217;s terrifying Web security vulnerability, courtesy of the 1990s crypto wars","author":"aslam","date":"May 21, 2015","format":false,"excerpt":"mostlysignssomeportents: The Logjam bug allows attackers to break secure connections by tricking the browser and server to communicate using weak crypto \u2013 but why do browsers and servers support weak crypto in the first place? The answer is in the Bill Clinton-era export restrictions on strong crypto. During the first\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"http:\/\/i0.wp.com\/craphound.com\/images\/bc.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/comments?post=266"}],"version-history":[{"count":1,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/266\/revisions"}],"predecessor-version":[{"id":2287,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/266\/revisions\/2287"}],"wp:attachment":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/media?parent=266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/categories?post=266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/tags?post=266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}