JaromilMA · 2 days agoBreaking and Fixing Content-Defined Chunkingplus-squareeprint.iacr.orgexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkBreaking and Fixing Content-Defined Chunkingplus-squareeprint.iacr.orgJaromilMA · 2 days agomessage-square0fedilink
vortex · edit-219 days agoEU Cyber Resilience Act: feedback on important and critical products with digital elementsplus-squareec.europa.euexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkEU Cyber Resilience Act: feedback on important and critical products with digital elementsplus-squareec.europa.euvortex · edit-219 days agomessage-square0fedilink
JaromilMA · 29 days agoGoogle’s 'consent-less' Android tracking probed by academicsplus-squarewww.theregister.comexternal-linkmessage-square2fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkGoogle’s 'consent-less' Android tracking probed by academicsplus-squarewww.theregister.comJaromilMA · 29 days agomessage-square2fedilink
BusKill@lemmy.sdf.org · 29 days agoTechlore video review of BusKill (Open-Source Dead Man Switch) 🔒plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up11arrow-down14
arrow-up1-3arrow-down1external-linkTechlore video review of BusKill (Open-Source Dead Man Switch) 🔒plus-squarewww.buskill.inBusKill@lemmy.sdf.org · 29 days agomessage-square0fedilink
JaromilMA · 1 month agoGoogle’s Fingerprinting Returns In 8 Weeks And It Will Track Your Devicesplus-squarewww.forbes.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkGoogle’s Fingerprinting Returns In 8 Weeks And It Will Track Your Devicesplus-squarewww.forbes.comJaromilMA · 1 month agomessage-square0fedilink
JaromilMA · 1 month agoApple pulls data protection feature in UK amid government demandsplus-squarewww.reuters.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkApple pulls data protection feature in UK amid government demandsplus-squarewww.reuters.comJaromilMA · 1 month agomessage-square0fedilink
Settoletto 🍤MA · edit-21 month agoFBI recommends using adblockersplus-squarewww.ic3.govexternal-linkmessage-square0fedilinkarrow-up19arrow-down12
arrow-up17arrow-down1external-linkFBI recommends using adblockersplus-squarewww.ic3.govSettoletto 🍤MA · edit-21 month agomessage-square0fedilink
Settoletto 🍤MA · 1 month agoTeen on Musk’s DOGE Team Graduated from ‘The Com’plus-squarekrebsonsecurity.comexternal-linkmessage-square2fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkTeen on Musk’s DOGE Team Graduated from ‘The Com’plus-squarekrebsonsecurity.comSettoletto 🍤MA · 1 month agomessage-square2fedilink
JaromilMA · 2 months agoWe are destroying softwareplus-squareantirez.comexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkWe are destroying softwareplus-squareantirez.comJaromilMA · 2 months agomessage-square0fedilink
BusKill@lemmy.sdf.org · edit-23 months agoBusKill (Dead Man Switch) Warrant Canary for 2025 H1plus-squarebuskill.inexternal-linkmessage-square0fedilinkarrow-up13arrow-down16
arrow-up1-3arrow-down1external-linkBusKill (Dead Man Switch) Warrant Canary for 2025 H1plus-squarebuskill.inBusKill@lemmy.sdf.org · edit-23 months agomessage-square0fedilink
JaromilMA · 3 months agoThreat Modeling: The First Step on Your Privacy Journey - Privacy Guidesplus-squarewww.privacyguides.orgexternal-linkmessage-square1fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkThreat Modeling: The First Step on Your Privacy Journey - Privacy Guidesplus-squarewww.privacyguides.orgJaromilMA · 3 months agomessage-square1fedilink
Settoletto 🍤MA · edit-24 months agoInternational operation takes down another encrypted messaging serviceplus-squarewww.europol.europa.euexternal-linkmessage-square0fedilinkarrow-up115arrow-down10
arrow-up115arrow-down1external-linkInternational operation takes down another encrypted messaging serviceplus-squarewww.europol.europa.euSettoletto 🍤MA · edit-24 months agomessage-square0fedilink
JaromilMA · 4 months agoThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comexternal-linkmessage-square0fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1external-linkThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comJaromilMA · 4 months agomessage-square0fedilink
JaromilMA · 4 months agoThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comexternal-linkmessage-square1fedilinkarrow-up111arrow-down11
arrow-up110arrow-down1external-linkThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comJaromilMA · 4 months agomessage-square1fedilink
JaromilMA · 4 months agoVulnerabilities in VPNs: Paper presented at the Privacy Enhancing Technologies Symposium 2024 - The Citizen Labplus-squarecitizenlab.caexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkVulnerabilities in VPNs: Paper presented at the Privacy Enhancing Technologies Symposium 2024 - The Citizen Labplus-squarecitizenlab.caJaromilMA · 4 months agomessage-square1fedilink
JaromilMA · 4 months agoJoint investigation of submarine cable sabotage in Europeplus-squarewww.euractiv.comexternal-linkmessage-square0fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1external-linkJoint investigation of submarine cable sabotage in Europeplus-squarewww.euractiv.comJaromilMA · 4 months agomessage-square0fedilink
JaromilMA · 4 months agoMany US water systems exposed to ‘high-risk’ vulnerabilities, watchdog findsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkMany US water systems exposed to ‘high-risk’ vulnerabilities, watchdog findsplus-squaretherecord.mediaJaromilMA · 4 months agomessage-square0fedilink
JaromilMA · 5 months agoBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comexternal-linkmessage-square1fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comJaromilMA · 5 months agomessage-square1fedilink
Settoletto 🍤MA · 5 months agoEUDI-ARF shortcomings: privacy, HSM, post-quantum (non) readiness and moreplus-squarewebsummit.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkEUDI-ARF shortcomings: privacy, HSM, post-quantum (non) readiness and moreplus-squarewebsummit.comSettoletto 🍤MA · 5 months agomessage-square0fedilink
JaromilMA · 5 months agoWireHole enables users to quickly and easily create a personally managed VPN with ad blocking and additional privacy optionsplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up118arrow-down10
arrow-up118arrow-down1external-linkWireHole enables users to quickly and easily create a personally managed VPN with ad blocking and additional privacy optionsplus-squaregithub.comJaromilMA · 5 months agomessage-square0fedilink