@anon
sign up
@anon
sign up
pull down to refresh
PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Devices
thehackernews.com/2024/09/new-pixhell-attack-exploits-screen.html
757 sats
\
2 comments
\
@ch0k1
10 Sep
security
related
GrapheneOS discloses vulnerabilities actively exploited by forensic companies
5868 sats
\
7 comments
\
@final
12 Jan
security
Attacking UNIX Systems via CUPS, Part I
www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
3757 sats
\
5 comments
\
@0xB10C
26 Sep
security
Dark Skippy Disclosure - A Powerful Method For Key Exfil Attacks
darkskippy.com
23.3k sats
\
11 comments
\
@utxoclub
5 Aug
security
My Extreme Privacy Journey - PART 2: GrapheneOS
20k sats
\
10 comments
\
@runningbitcoin
2 Nov
tutorials
New chip flaw hits Apple Silicon and steals cryptographic keys from system cache
www.tomshardware.com/pc-components/cpus/new-chip-flaw-hits-apple-silicon-and-steals-cryptographic-keys-from-system-cache-gofetch-vulnerability-attacks-apple-m1-m2-m3-processors-cant-be-fixed-in-hardware
925 sats
\
5 comments
\
@ch0k1
22 Mar
security
How the Greatest Hacker Manipulated Everyone
youtu.be/aLUDhbQojxA?si=_DxItJ3aLBM7ZnCc
746 sats
\
6 comments
\
@Car
27 May
security
extreme paranoia with hardware wallets
1341 sats
\
7 comments
\
@lloyddunne
25 Oct 2023
bitcoin
Hertzbleed: a New Family of Side Channel Attacks
www.hertzbleed.com/
292 sats
\
2 comments
\
@CypherPoet
15 Jun 2022
bitcoin
Three Million Malware — Infected Smart Toothbrushes Used in Swiss DDoS Attacks
www.tomshardware.com/networking/three-million-malware-infected-smart-toothbrushes-used-in-swiss-ddos-attacks-botnet-causes-millions-of-euros-in-damages
1939 sats
\
4 comments
\
@0xbitcoiner
6 Feb
security
Taping over your webcam not enough — device's ambient light sensor used to spy
www.tomshardware.com/cameras/hackers-may-be-able-to-spy-on-you-using-a-devices-ambient-light-sensor
288 sats
\
6 comments
\
@DEADBEEF
1 Feb
privacy
Hacking Systems via Exposed ETCD Instances
rootedsec.io/pages/posts/08-04-24/hacking-etcd.html
250 sats
\
0 comments
\
@r3drun3
8 Apr
security
The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind
www.wired.com/story/jia-tan-xz-backdoor/
523 sats
\
2 comments
\
@ch0k1
3 Apr
security
GrapheneOS: Debunking fake stock Pixel OS vulnerability from an EDR company
discuss.grapheneos.org/d/14993-debunking-fake-stock-pixel-os-vulnerability-from-an-edr-company
1068 sats
\
1 comment
\
@final
16 Aug
tech
Magnet Goblin hackers use 1-day flaws to drop custom Linux malware
www.bleepingcomputer.com/news/security/magnet-goblin-hackers-use-1-day-flaws-to-drop-custom-linux-malware/
61 sats
\
2 comments
\
@ch0k1
9 Mar
security
Critical vulnerability affecting most Linux distros allows for bootkits
arstechnica.com/security/2024/02/critical-vulnerability-affecting-most-linux-distros-allows-for-bootkits/
976 sats
\
0 comments
\
@ch0k1
7 Feb
security
37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers
www.youtube.com/watch?v=1f6YyH62jFE
896 sats
\
4 comments
\
@ek
29 Dec 2023
security
freebie
Understanding Silent Payments – Part I
bitbox.swiss/blog/understanding-silent-payments-part-one/
1290 sats
\
11 comments
\
@0xbitcoiner
5 Sep
bitcoin
iLeakage: Browser-Based Timerless Speculative Execution Attacks on Apple Devices
ileakage.com/
130 sats
\
1 comment
\
@hn
25 Oct 2023
tech
Windows 11, Tesla, and Ubuntu Linux hacked at Pwn2Own Vancouver
www.bleepingcomputer.com/news/security/windows-11-tesla-and-ubuntu-linux-hacked-at-pwn2own-vancouver/amp/
148 sats
\
0 comments
\
@ch0k1
22 Mar
security
Listen to the whispers: web timing attacks that actually work
portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work
94 sats
\
0 comments
\
@Rsync25
10h
tech
A brief history of the U.S. trying to add backdoors into encrypted data (2016)
www.atlasobscura.com/articles/a-brief-history-of-the-nsa-attempting-to-insert-backdoors-into-encrypted-data
435 sats
\
1 comment
\
@hn
3 Feb
tech
more