BusKill · 23 days agoTechlore video review of BusKill (Open-Source Dead Man Switch) 🔒plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTechlore video review of BusKill (Open-Source Dead Man Switch) 🔒plus-squarewww.buskill.inBusKill · 23 days agomessage-square0fedilink
BusKill · edit-22 months agoBusKill (Dead Man Switch) Warrant Canary for 2025 H1plus-squarebuskill.inexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBusKill (Dead Man Switch) Warrant Canary for 2025 H1plus-squarebuskill.inBusKill · edit-22 months agomessage-square0fedilink
Jaromil@fed.dyne.orgM · 4 months agoThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Accessplus-squarewww.volexity.comJaromil@fed.dyne.orgM · 4 months agomessage-square0fedilink
Jaromil@fed.dyne.orgM · 4 months agoThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Technology the Trump Administration Could Use to Hack Your Phoneplus-squarewww.newyorker.comJaromil@fed.dyne.orgM · 4 months agomessage-square0fedilink
Jaromil@fed.dyne.orgM · 4 months agoVulnerabilities in VPNs: Paper presented at the Privacy Enhancing Technologies Symposium 2024 - The Citizen Labplus-squarecitizenlab.caexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerabilities in VPNs: Paper presented at the Privacy Enhancing Technologies Symposium 2024 - The Citizen Labplus-squarecitizenlab.caJaromil@fed.dyne.orgM · 4 months agomessage-square0fedilink
Jaromil@fed.dyne.orgM · 4 months agoJoint investigation of submarine cable sabotage in Europeplus-squarewww.euractiv.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJoint investigation of submarine cable sabotage in Europeplus-squarewww.euractiv.comJaromil@fed.dyne.orgM · 4 months agomessage-square0fedilink
Jaromil@fed.dyne.orgM · 4 months agoMany US water systems exposed to ‘high-risk’ vulnerabilities, watchdog findsplus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMany US water systems exposed to ‘high-risk’ vulnerabilities, watchdog findsplus-squaretherecord.mediaJaromil@fed.dyne.orgM · 4 months agomessage-square0fedilink
Jaromil@fed.dyne.orgM · 5 months agoBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HATplus-squaregithub.comJaromil@fed.dyne.orgM · 5 months agomessage-square0fedilink
Settoletto 🍤@fed.dyne.orgM · 5 months agoEUDI-ARF shortcomings: privacy, HSM, post-quantum (non) readiness and moreplus-squarewebsummit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEUDI-ARF shortcomings: privacy, HSM, post-quantum (non) readiness and moreplus-squarewebsummit.comSettoletto 🍤@fed.dyne.orgM · 5 months agomessage-square0fedilink
Jaromil@fed.dyne.orgM · 5 months agoWireHole enables users to quickly and easily create a personally managed VPN with ad blocking and additional privacy optionsplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWireHole enables users to quickly and easily create a personally managed VPN with ad blocking and additional privacy optionsplus-squaregithub.comJaromil@fed.dyne.orgM · 5 months agomessage-square0fedilink
Settoletto 🍤@fed.dyne.orgM · 5 months agoOne weird trick to get the whole planet to send abuse complaints to your best friend(s)plus-squaredelroth.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOne weird trick to get the whole planet to send abuse complaints to your best friend(s)plus-squaredelroth.netSettoletto 🍤@fed.dyne.orgM · 5 months agomessage-square0fedilink
Jaromil@fed.dyne.orgM · 6 months agoCan You Get Root With Only a Cigarette Lighter? | Blogplus-squarewww.da.vidbuchanan.co.ukexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCan You Get Root With Only a Cigarette Lighter? | Blogplus-squarewww.da.vidbuchanan.co.ukJaromil@fed.dyne.orgM · 6 months agomessage-square0fedilink
vortex@fed.dyne.org · edit-26 months agoMozilla reveals its true colours ... as ad pushersplus-squareblog.mozilla.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMozilla reveals its true colours ... as ad pushersplus-squareblog.mozilla.orgvortex@fed.dyne.org · edit-26 months agomessage-square0fedilink
Settoletto 🍤@fed.dyne.orgM · 6 months agoU.S. Wiretap Systems Targeted in China-Linked Hack. Cue The Hives "I hate to say i told you so"www.wsj.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkU.S. Wiretap Systems Targeted in China-Linked Hack. Cue The Hives "I hate to say i told you so"www.wsj.comSettoletto 🍤@fed.dyne.orgM · 6 months agomessage-square0fedilink
Jaromil@fed.dyne.orgM · 6 months agoHumble Tech Book Bundle: Cybersecurity Month MEGA Bundle by O'Reillyplus-squarewww.humblebundle.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHumble Tech Book Bundle: Cybersecurity Month MEGA Bundle by O'Reillyplus-squarewww.humblebundle.comJaromil@fed.dyne.orgM · 6 months agomessage-square0fedilink
vortex@fed.dyne.org · edit-26 months agoListen up, changing SSH daemon to non-standard port is a waste of time & even less secureplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkListen up, changing SSH daemon to non-standard port is a waste of time & even less secureplus-squarewww.youtube.comvortex@fed.dyne.org · edit-26 months agomessage-square0fedilink
Settoletto 🍤@fed.dyne.orgM · 6 months agoAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAttacking UNIX Systems via CUPS, Part Iplus-squarewww.evilsocket.netSettoletto 🍤@fed.dyne.orgM · 6 months agomessage-square0fedilink
vortex@fed.dyne.org · edit-26 months agoVeritasium on SS7 global phone vulnerabilitiesplus-squareyoutube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVeritasium on SS7 global phone vulnerabilitiesplus-squareyoutube.comvortex@fed.dyne.org · edit-26 months agomessage-square0fedilink
vortex@fed.dyne.org · edit-27 months agobe the whois you always wanted to beplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkbe the whois you always wanted to beplus-squarearstechnica.comvortex@fed.dyne.org · edit-27 months agomessage-square0fedilink
vortex@fed.dyne.orgEnglish · 7 months agoWhere Warlocks Stay Up Late: Anthropological Hacker Mapplus-squarewherewarlocksstayuplate.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhere Warlocks Stay Up Late: Anthropological Hacker Mapplus-squarewherewarlocksstayuplate.comvortex@fed.dyne.orgEnglish · 7 months agomessage-square0fedilink