cyph3rPunkM · 10 days agoThe Greatest Hack in History [26:08]plus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down11
arrow-up14arrow-down1external-linkThe Greatest Hack in History [26:08]plus-squareyoutu.becyph3rPunkM · 10 days agomessage-square0linkfedilink
cyph3rPunkM · edit-22 months agoMigration to Post-Quantum Cryptography Quantum Readiness: Cryptographic Discoveryplus-squarewww.nccoe.nist.govexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkMigration to Post-Quantum Cryptography Quantum Readiness: Cryptographic Discoveryplus-squarewww.nccoe.nist.govcyph3rPunkM · edit-22 months agomessage-square0linkfedilink
cyph3rPunkM · edit-23 months ago38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-link38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.becyph3rPunkM · edit-23 months agomessage-square0linkfedilink
cyph3rPunkM · edit-23 months agoDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.netexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.netcyph3rPunkM · edit-23 months agomessage-square0linkfedilink
demesisxEnglish · 5 months agoFirst Principles Thinking: From Foundational Truths to Revolutionary Solutionsplus-squareprofincognito.meexternal-linkmessage-square0linkfedilinkarrow-up127arrow-down12
arrow-up125arrow-down1external-linkFirst Principles Thinking: From Foundational Truths to Revolutionary Solutionsplus-squareprofincognito.medemesisxEnglish · 5 months agomessage-square0linkfedilink
cyph3rPunkM · 6 months agoDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxplus-squareyoutu.beexternal-linkmessage-square1linkfedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxplus-squareyoutu.becyph3rPunkM · 6 months agomessage-square1linkfedilink
adr1an@programming.dev · 9 months agoHackers hope to democratize laser-based processor hacking — $500 RayV Lite relies on 3D printing, a laser pen, and a Raspberry Pi to bring costs downplus-squarewww.tomshardware.comexternal-linkmessage-square0linkfedilinkarrow-up138arrow-down11
arrow-up137arrow-down1external-linkHackers hope to democratize laser-based processor hacking — $500 RayV Lite relies on 3D printing, a laser pen, and a Raspberry Pi to bring costs downplus-squarewww.tomshardware.comadr1an@programming.dev · 9 months agomessage-square0linkfedilink
demesisxEnglish · 9 months agohacker 'ghost' on githubplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkhacker 'ghost' on githubplus-squarewww.wired.comdemesisxEnglish · 9 months agomessage-square0linkfedilink
cyph3rPunkM · 10 months agonew vulnerability in your motherboardplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up125arrow-down11
arrow-up124arrow-down1external-linknew vulnerability in your motherboardplus-squareyoutu.becyph3rPunkM · 10 months agomessage-square0linkfedilink
cyph3rPunkM · 10 months agoXenoRAT | Malware of the Dayplus-squareyoutu.beexternal-linkmessage-square1linkfedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkXenoRAT | Malware of the Dayplus-squareyoutu.becyph3rPunkM · 10 months agomessage-square1linkfedilink
cyph3rPunkM · 1 year agoThe Unbreakable Kryptos Codeplus-squareyoutu.beexternal-linkmessage-square1linkfedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkThe Unbreakable Kryptos Codeplus-squareyoutu.becyph3rPunkM · 1 year agomessage-square1linkfedilink
Jake Farm@sopuli.xyzEnglish · 1 year agoIs there anything stopping this set up from being deployed else where?plus-squareyoutu.beexternal-linkmessage-square2linkfedilinkarrow-up120arrow-down11
arrow-up119arrow-down1external-linkIs there anything stopping this set up from being deployed else where?plus-squareyoutu.beJake Farm@sopuli.xyzEnglish · 1 year agomessage-square2linkfedilink
cyph3rPunkM · 1 year agoMalicious Backdoor in xz liblzmaplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up125arrow-down12
arrow-up123arrow-down1external-linkMalicious Backdoor in xz liblzmaplus-squareyoutu.becyph3rPunkM · 1 year agomessage-square0linkfedilink
cyph3rPunkM · 1 year agonew linux exploit is absolutely insaneplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down110
arrow-up10arrow-down1external-linknew linux exploit is absolutely insaneplus-squareyoutu.becyph3rPunkM · 1 year agomessage-square0linkfedilink
cyph3rPunkM · 1 year agoBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.beexternal-linkmessage-square4linkfedilinkarrow-up150arrow-down13
arrow-up147arrow-down1external-linkBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.becyph3rPunkM · 1 year agomessage-square4linkfedilink
SLfgb@feddit.nlEnglish · 1 year ago'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024plus-squarewww.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up117arrow-down12
arrow-up115arrow-down1external-link'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024plus-squarewww.youtube.comSLfgb@feddit.nlEnglish · 1 year agomessage-square0linkfedilink
demesisxEnglish · 1 year agoPenetration Testing with Nmap: A Comprehensive Tutorialplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up126arrow-down11
arrow-up125arrow-down1external-linkPenetration Testing with Nmap: A Comprehensive Tutorialplus-squareyoutu.bedemesisxEnglish · 1 year agomessage-square0linkfedilink
cyph3rPunkM · edit-21 year agoHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up144arrow-down14
arrow-up140arrow-down1external-linkHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.becyph3rPunkM · edit-21 year agomessage-square0linkfedilink
cyph3rPunkM · 1 year agoHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up113arrow-down13
arrow-up110arrow-down1external-linkHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.becyph3rPunkM · 1 year agomessage-square0linkfedilink
cyph3rPunkM · 1 year agoAdvanced Meshtastic Seriesplus-squarewww.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up117arrow-down11
arrow-up116arrow-down1external-linkAdvanced Meshtastic Seriesplus-squarewww.youtube.comcyph3rPunkM · 1 year agomessage-square0linkfedilink