A message from Cicada was discovered on Pastebin at the end of April 2017. It read “Beware false paths. Always verify PGP signature from 7A35090F” and was, in fact, signed using the appropriate Cicada 3301 PGP key. Read further to find out how you can verify messages from Cicada and get involved in solving the latest puzzle.
Since our first installment in this series, there has been little excitement around the Cicada 3301 community, as a verified clue has yet to surface online or, as far as we know, in real life. A user going by the handle CicadaDave came forward on Reddit claiming to be part of a four-person team behind Cicada. His original post has since been deleted, but a lone comment remains on the account stating “I am Michael Cicada, aka Cicada Dave. We created Cicada 3301 as a joke between 4 bored MIT students. I am on Facebook if you have questions.”
Read more “Cicadas & Security, Part 2: When a Verified PGP Key Takes You on a Trip to the Desert”
When you think of alternate reality games (ARGs), things such as Ingress or Pokemon GO probably come to mind. While thinking about ways to use encryption or navigate the Tor network, you most likely wouldn’t think to start by browsing 4chan’s /x/ (paranormal) board. Yet on January 5, 2012 many people found themselves intrigued and began their journey to greater security knowledge, and perhaps to “enlightenment” (as a later puzzle states). Read more “Cicadas & Security: How an Alternate Reality Game Teaches Encryption and Security Best Practices, Part 1”
Recently, we’ve had a few customer inquiries about how the Threat Stack Agent co-exists with AppArmor. This led us into a detailed exploration of AppArmor’s componentry, how it interacts with the kernel audit system, and how customers can effectively use our platform along with AppArmor.
Read more “Threat Stack and AppArmor – a Match Made in Cloud Security Heaven!”