BusKill@lemmy.sdf.org · edit-218 days agoBusKill (Dead Man Switch) Warrant Canary for 2025 H1plus-squarebuskill.inexternal-linkmessage-square0fedilinkarrow-up12arrow-down14
arrow-up1-2arrow-down1external-linkBusKill (Dead Man Switch) Warrant Canary for 2025 H1plus-squarebuskill.inBusKill@lemmy.sdf.org · edit-218 days agomessage-square0fedilink
JaromilMA · 1 month agoThreat Modeling: The First Step on Your Privacy Journey - Privacy Guidesplus-squarewww.privacyguides.orgexternal-linkmessage-square1fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkThreat Modeling: The First Step on Your Privacy Journey - Privacy Guidesplus-squarewww.privacyguides.orgJaromilMA · 1 month agomessage-square1fedilink
Settoletto 🍤MA · edit-22 months agoInternational operation takes down another encrypted messaging serviceplus-squarewww.europol.europa.euexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkInternational operation takes down another encrypted messaging serviceplus-squarewww.europol.europa.euSettoletto 🍤MA · edit-22 months agomessage-square0fedilink
JaromilMA · 2 months agoThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comJaromilMA · 2 months agomessage-square0fedilink
JaromilMA · 2 months agoThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comexternal-linkmessage-square1fedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comJaromilMA · 2 months agomessage-square1fedilink
JaromilMA · 2 months agoVulnerabilities in VPNs: Paper presented at the Privacy Enhancing Technologies Symposium 2024 - The Citizen Labplus-squarecitizenlab.caexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkVulnerabilities in VPNs: Paper presented at the Privacy Enhancing Technologies Symposium 2024 - The Citizen Labplus-squarecitizenlab.caJaromilMA · 2 months agomessage-square1fedilink
JaromilMA · 2 months agoJoint investigation of submarine cable sabotage in Europeplus-squarewww.euractiv.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkJoint investigation of submarine cable sabotage in Europeplus-squarewww.euractiv.comJaromilMA · 2 months agomessage-square0fedilink
JaromilMA · 2 months agoMany US water systems exposed to ‘high-risk’ vulnerabilities, watchdog findsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkMany US water systems exposed to ‘high-risk’ vulnerabilities, watchdog findsplus-squaretherecord.mediaJaromilMA · 2 months agomessage-square0fedilink
JaromilMA · 3 months agoBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comJaromilMA · 3 months agomessage-square1fedilink
Settoletto 🍤MA · 3 months agoEUDI-ARF shortcomings: privacy, HSM, post-quantum (non) readiness and moreplus-squarewebsummit.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkEUDI-ARF shortcomings: privacy, HSM, post-quantum (non) readiness and moreplus-squarewebsummit.comSettoletto 🍤MA · 3 months agomessage-square0fedilink
JaromilMA · 3 months agoWireHole enables users to quickly and easily create a personally managed VPN with ad blocking and additional privacy optionsplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkWireHole enables users to quickly and easily create a personally managed VPN with ad blocking and additional privacy optionsplus-squaregithub.comJaromilMA · 3 months agomessage-square0fedilink
Settoletto 🍤MA · 3 months agoOne weird trick to get the whole planet to send abuse complaints to your best friend(s)plus-squaredelroth.netexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkOne weird trick to get the whole planet to send abuse complaints to your best friend(s)plus-squaredelroth.netSettoletto 🍤MA · 3 months agomessage-square0fedilink
JaromilMA · 4 months agoCan You Get Root With Only a Cigarette Lighter? | Blogplus-squarewww.da.vidbuchanan.co.ukexternal-linkmessage-square1fedilinkarrow-up15arrow-down12
arrow-up13arrow-down1external-linkCan You Get Root With Only a Cigarette Lighter? | Blogplus-squarewww.da.vidbuchanan.co.ukJaromilMA · 4 months agomessage-square1fedilink
vortex · edit-24 months agoMozilla reveals its true colours ... as ad pushersplus-squareblog.mozilla.orgexternal-linkmessage-square1fedilinkarrow-up15arrow-down114
arrow-up1-9arrow-down1external-linkMozilla reveals its true colours ... as ad pushersplus-squareblog.mozilla.orgvortex · edit-24 months agomessage-square1fedilink
Settoletto 🍤MA · 4 months agoU.S. Wiretap Systems Targeted in China-Linked Hack. Cue The Hives "I hate to say i told you so"plus-squarewww.wsj.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkU.S. Wiretap Systems Targeted in China-Linked Hack. Cue The Hives "I hate to say i told you so"plus-squarewww.wsj.comSettoletto 🍤MA · 4 months agomessage-square0fedilink
JaromilMA · 4 months agoHumble Tech Book Bundle: Cybersecurity Month MEGA Bundle by O'Reillyplus-squarewww.humblebundle.comexternal-linkmessage-square0fedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-linkHumble Tech Book Bundle: Cybersecurity Month MEGA Bundle by O'Reillyplus-squarewww.humblebundle.comJaromilMA · 4 months agomessage-square0fedilink
vortex · edit-24 months agoListen up, changing SSH daemon to non-standard port is a waste of time & even less secureplus-squarewww.youtube.comexternal-linkmessage-square8fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkListen up, changing SSH daemon to non-standard port is a waste of time & even less secureplus-squarewww.youtube.comvortex · edit-24 months agomessage-square8fedilink
Settoletto 🍤MA · 4 months agoAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netexternal-linkmessage-square0fedilinkarrow-up12arrow-down12
arrow-up10arrow-down1external-linkAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netSettoletto 🍤MA · 4 months agomessage-square0fedilink
vortex · edit-24 months agoVeritasium on SS7 global phone vulnerabilitiesplus-squareyoutube.comexternal-linkmessage-square0fedilinkarrow-up115arrow-down12
arrow-up113arrow-down1external-linkVeritasium on SS7 global phone vulnerabilitiesplus-squareyoutube.comvortex · edit-24 months agomessage-square0fedilink
vortex · edit-25 months agobe the whois you always wanted to beplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkbe the whois you always wanted to beplus-squarearstechnica.comvortex · edit-25 months agomessage-square0fedilink