cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 8 months agoAirborne: Wormable Zero-Click RCE in Apple AirPlay Puts Billions of Devices at Risk | Oligo Security | Oligo Securityplus-squarewww.oligo.securityexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAirborne: Wormable Zero-Click RCE in Apple AirPlay Puts Billions of Devices at Risk | Oligo Security | Oligo Securityplus-squarewww.oligo.securitycyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 8 months agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 9 months agoThe Greatest Hack in History [26:08]plus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Greatest Hack in History [26:08]plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 9 months agomessage-square0linkfedilink
cyph3rPunk@infosec.pub to Cardano@infosec.pub · 9 months agoCardano Governing Board Updateplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareCardano Governing Board Updateplus-squarecyph3rPunk@infosec.pub to Cardano@infosec.pub · 9 months agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 11 months agoMigration to Post-Quantum Cryptography Quantum Readiness: Cryptographic Discoveryplus-squarewww.nccoe.nist.govexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkMigration to Post-Quantum Cryptography Quantum Readiness: Cryptographic Discoveryplus-squarewww.nccoe.nist.govcyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 11 months agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-21 year ago38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-link38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-21 year agomessage-square0linkfedilink
cyph3rPunk@infosec.pub to Formal Methods@programming.dev · 1 year agoVerified Effectful Programming in F* - Catalin Hritcuplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVerified Effectful Programming in F* - Catalin Hritcuplus-squareyoutu.becyph3rPunk@infosec.pub to Formal Methods@programming.dev · 1 year agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-21 year agoDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.netcyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-21 year agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agoDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agonew vulnerability in your motherboardplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linknew vulnerability in your motherboardplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agoXenoRAT | Malware of the Dayplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkXenoRAT | Malware of the Dayplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agoThe Unbreakable Kryptos Codeplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Unbreakable Kryptos Codeplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agoMalicious Backdoor in xz liblzmaplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalicious Backdoor in xz liblzmaplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agonew linux exploit is absolutely insaneplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linknew linux exploit is absolutely insaneplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agoBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0linkfedilink
cyph3rPunk@infosec.pub to Blockchain Voting@infosec.pub · 2 years agoCharles on Selective Disclosure Regimes using Midnightplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCharles on Selective Disclosure Regimes using Midnightplus-squareyoutu.becyph3rPunk@infosec.pub to Blockchain Voting@infosec.pub · 2 years agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agoHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agoHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agoAdvanced Meshtastic Seriesplus-squarewww.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAdvanced Meshtastic Seriesplus-squarewww.youtube.comcyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agoTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.beexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agoDarknet Diaries: True stories from the dark side of the Internetplus-squaredarknetdiaries.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDarknet Diaries: True stories from the dark side of the Internetplus-squaredarknetdiaries.comcyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0linkfedilink