cyph3rPunk@infosec.pubM · edit-224 days ago38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.becyph3rPunk@infosec.pubM · edit-224 days agomessage-square0fedilink
cyph3rPunk@infosec.pubM · edit-21 month agoDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.netcyph3rPunk@infosec.pubM · edit-21 month agomessage-square0fedilink
demesisx@infosec.pubEnglish · 3 months agoFirst Principles Thinking: From Foundational Truths to Revolutionary Solutionsplus-squareprofincognito.meexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFirst Principles Thinking: From Foundational Truths to Revolutionary Solutionsplus-squareprofincognito.medemesisx@infosec.pubEnglish · 3 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 4 months agoDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxyoutu.becyph3rPunk@infosec.pubM · 4 months agomessage-square0fedilink
adr1an@programming.dev · 6 months agoHackers hope to democratize laser-based processor hacking — $500 RayV Lite relies on 3D printing, a laser pen, and a Raspberry Pi to bring costs downplus-squarewww.tomshardware.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHackers hope to democratize laser-based processor hacking — $500 RayV Lite relies on 3D printing, a laser pen, and a Raspberry Pi to bring costs downplus-squarewww.tomshardware.comadr1an@programming.dev · 6 months agomessage-square0fedilink
demesisx@infosec.pubEnglish · 6 months agohacker 'ghost' on githubplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkhacker 'ghost' on githubplus-squarewww.wired.comdemesisx@infosec.pubEnglish · 6 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 7 months agonew vulnerability in your motherboardplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linknew vulnerability in your motherboardplus-squareyoutu.becyph3rPunk@infosec.pubM · 7 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 8 months agoXenoRAT | Malware of the Dayplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkXenoRAT | Malware of the Dayplus-squareyoutu.becyph3rPunk@infosec.pubM · 8 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 9 months agoThe Unbreakable Kryptos Codeyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Unbreakable Kryptos Codeyoutu.becyph3rPunk@infosec.pubM · 9 months agomessage-square0fedilink
Jake Farm@sopuli.xyzEnglish · 9 months agoIs there anything stopping this set up from being deployed else where?youtu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIs there anything stopping this set up from being deployed else where?youtu.beJake Farm@sopuli.xyzEnglish · 9 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 10 months agoMalicious Backdoor in xz liblzmaplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalicious Backdoor in xz liblzmaplus-squareyoutu.becyph3rPunk@infosec.pubM · 10 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 11 months agonew linux exploit is absolutely insaneyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linknew linux exploit is absolutely insaneyoutu.becyph3rPunk@infosec.pubM · 11 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 11 months agoBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.becyph3rPunk@infosec.pubM · 11 months agomessage-square0fedilink
SLfgb@feddit.nlEnglish · 11 months ago'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024www.youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024www.youtube.comSLfgb@feddit.nlEnglish · 11 months agomessage-square0fedilink
demesisx@infosec.pubEnglish · 11 months agoPenetration Testing with Nmap: A Comprehensive Tutorial youtu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPenetration Testing with Nmap: A Comprehensive Tutorial youtu.bedemesisx@infosec.pubEnglish · 11 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · edit-21 year agoHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.becyph3rPunk@infosec.pubM · edit-21 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 1 year agoHow to Start a War With a Flash Drive (31:45)youtu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Start a War With a Flash Drive (31:45)youtu.becyph3rPunk@infosec.pubM · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 1 year agoAdvanced Meshtastic Seriesplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAdvanced Meshtastic Seriesplus-squarewww.youtube.comcyph3rPunk@infosec.pubM · 1 year agomessage-square0fedilink
Jake Farm@sopuli.xyzEnglish · 1 year agoLoRa Meshtastic networks were labeled a threat by Rutgers. Now I am interested. youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLoRa Meshtastic networks were labeled a threat by Rutgers. Now I am interested. youtube.comJake Farm@sopuli.xyzEnglish · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 1 year agoTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.becyph3rPunk@infosec.pubM · 1 year agomessage-square0fedilink