@cyph3rPunk@infosec.pubM • 9 days agoThe Greatest Hack in History [26:08]plus-squareyoutu.bemessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkThe Greatest Hack in History [26:08]plus-squareyoutu.be@cyph3rPunk@infosec.pubM • 9 days agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • edit-22 months agoMigration to Post-Quantum Cryptography Quantum Readiness: Cryptographic Discoveryplus-squarewww.nccoe.nist.govmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkMigration to Post-Quantum Cryptography Quantum Readiness: Cryptographic Discoveryplus-squarewww.nccoe.nist.gov@cyph3rPunk@infosec.pubM • edit-22 months agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • edit-23 months ago38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.bemessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-link38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.be@cyph3rPunk@infosec.pubM • edit-23 months agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • edit-23 months agoDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.netexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.net@cyph3rPunk@infosec.pubM • edit-23 months agomessage-square0fedilink
@demesisx@infosec.pubEnglish • 5 months agoFirst Principles Thinking: From Foundational Truths to Revolutionary Solutionsplus-squareprofincognito.memessage-square0fedilinkarrow-up127arrow-down10
arrow-up127arrow-down1external-linkFirst Principles Thinking: From Foundational Truths to Revolutionary Solutionsplus-squareprofincognito.me@demesisx@infosec.pubEnglish • 5 months agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • 6 months agoDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxplus-squareyoutu.bemessage-square1fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-linkDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxplus-squareyoutu.be@cyph3rPunk@infosec.pubM • 6 months agomessage-square1fedilink
adr1an • 9 months agoHackers hope to democratize laser-based processor hacking — $500 RayV Lite relies on 3D printing, a laser pen, and a Raspberry Pi to bring costs downplus-squarewww.tomshardware.comexternal-linkmessage-square0fedilinkarrow-up136arrow-down10
arrow-up136arrow-down1external-linkHackers hope to democratize laser-based processor hacking — $500 RayV Lite relies on 3D printing, a laser pen, and a Raspberry Pi to bring costs downplus-squarewww.tomshardware.comadr1an • 9 months agomessage-square0fedilink
@demesisx@infosec.pubEnglish • 9 months agohacker 'ghost' on githubplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkhacker 'ghost' on githubplus-squarewww.wired.com@demesisx@infosec.pubEnglish • 9 months agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • 10 months agonew vulnerability in your motherboardplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up124arrow-down10
arrow-up124arrow-down1external-linknew vulnerability in your motherboardplus-squareyoutu.be@cyph3rPunk@infosec.pubM • 10 months agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • 10 months agoXenoRAT | Malware of the Dayplus-squareyoutu.beexternal-linkmessage-square1fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkXenoRAT | Malware of the Dayplus-squareyoutu.be@cyph3rPunk@infosec.pubM • 10 months agomessage-square1fedilink
@cyph3rPunk@infosec.pubM • 1 year agoThe Unbreakable Kryptos Codeplus-squareyoutu.beexternal-linkmessage-square1fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkThe Unbreakable Kryptos Codeplus-squareyoutu.be@cyph3rPunk@infosec.pubM • 1 year agomessage-square1fedilink
Jake FarmEnglish • 1 year agoIs there anything stopping this set up from being deployed else where?plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up119arrow-down10
arrow-up119arrow-down1external-linkIs there anything stopping this set up from being deployed else where?plus-squareyoutu.beJake FarmEnglish • 1 year agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • 1 year agoMalicious Backdoor in xz liblzmaplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkMalicious Backdoor in xz liblzmaplus-squareyoutu.be@cyph3rPunk@infosec.pubM • 1 year agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • 1 year agonew linux exploit is absolutely insaneplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linknew linux exploit is absolutely insaneplus-squareyoutu.be@cyph3rPunk@infosec.pubM • 1 year agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • 1 year agoBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.beexternal-linkmessage-square4fedilinkarrow-up149arrow-down10
arrow-up149arrow-down1external-linkBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.be@cyph3rPunk@infosec.pubM • 1 year agomessage-square4fedilink
@SLfgb@feddit.nlEnglish • 1 year ago'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024plus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-link'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024plus-squarewww.youtube.com@SLfgb@feddit.nlEnglish • 1 year agomessage-square0fedilink
@demesisx@infosec.pubEnglish • 1 year agoPenetration Testing with Nmap: A Comprehensive Tutorialplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up125arrow-down10
arrow-up125arrow-down1external-linkPenetration Testing with Nmap: A Comprehensive Tutorialplus-squareyoutu.be@demesisx@infosec.pubEnglish • 1 year agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • edit-21 year agoHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up143arrow-down10
arrow-up143arrow-down1external-linkHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.be@cyph3rPunk@infosec.pubM • edit-21 year agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • 1 year agoHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.be@cyph3rPunk@infosec.pubM • 1 year agomessage-square0fedilink
@cyph3rPunk@infosec.pubM • 1 year agoAdvanced Meshtastic Seriesplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkAdvanced Meshtastic Seriesplus-squarewww.youtube.com@cyph3rPunk@infosec.pubM • 1 year agomessage-square0fedilink