SLfgb@feddit.nlEnglish · 8 months ago'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024plus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-link'Lessons Julian taught me' - Yanis Varoufakis Speech | Night Falls In The Evening Lands: The Assange Epic | 9th March 2024plus-squarewww.youtube.comSLfgb@feddit.nlEnglish · 8 months agomessage-square0fedilink
demesisx@infosec.pubEnglish · 8 months agoPenetration Testing with Nmap: A Comprehensive Tutorialplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up123arrow-down11
arrow-up122arrow-down1external-linkPenetration Testing with Nmap: A Comprehensive Tutorialplus-squareyoutu.bedemesisx@infosec.pubEnglish · 8 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · edit-29 months agoHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up140arrow-down14
arrow-up136arrow-down1external-linkHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.becyph3rPunk@infosec.pubM · edit-29 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 9 months agoHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up19arrow-down13
arrow-up16arrow-down1external-linkHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.becyph3rPunk@infosec.pubM · 9 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 10 months agoAdvanced Meshtastic Seriesplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down11
arrow-up111arrow-down1external-linkAdvanced Meshtastic Seriesplus-squarewww.youtube.comcyph3rPunk@infosec.pubM · 10 months agomessage-square0fedilink
Jake Farm@sopuli.xyzEnglish · 11 months agoLoRa Meshtastic networks were labeled a threat by Rutgers. Now I am interested.plus-squareyoutube.comexternal-linkmessage-square1fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1external-linkLoRa Meshtastic networks were labeled a threat by Rutgers. Now I am interested.plus-squareyoutube.comJake Farm@sopuli.xyzEnglish · 11 months agomessage-square1fedilink
cyph3rPunk@infosec.pubM · 1 year agoTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.becyph3rPunk@infosec.pubM · 1 year agomessage-square0fedilink
demesisx@infosec.pubEnglish · 1 year agoIntell-dragonfly: A Cybersecurity Attack Surface Generation Engine Based On Artificial Intelligence-generated Content Technology. (arXiv:2311.00240v1 [cs.CR])plus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkIntell-dragonfly: A Cybersecurity Attack Surface Generation Engine Based On Artificial Intelligence-generated Content Technology. (arXiv:2311.00240v1 [cs.CR])plus-squarearxiv.orgdemesisx@infosec.pubEnglish · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 1 year agoDarknet Diaries: True stories from the dark side of the Internetplus-squaredarknetdiaries.comexternal-linkmessage-square15fedilinkarrow-up133arrow-down12
arrow-up131arrow-down1external-linkDarknet Diaries: True stories from the dark side of the Internetplus-squaredarknetdiaries.comcyph3rPunk@infosec.pubM · 1 year agomessage-square15fedilink
Damaskox@lemmy.world · 1 year agoPigpen Cypher IVlemmy.worldimagemessage-square6fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1imagePigpen Cypher IVlemmy.worldDamaskox@lemmy.world · 1 year agomessage-square6fedilink
Damaskox@lemmy.world · edit-21 year agoPigpen Cypher IIIlemmy.worldimagemessage-square2fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1imagePigpen Cypher IIIlemmy.worldDamaskox@lemmy.world · edit-21 year agomessage-square2fedilink
Damaskox@lemmy.world · 1 year agoPigpen Cypher IIlemmy.worldimagemessage-square4fedilinkarrow-up19arrow-down11
arrow-up18arrow-down1imagePigpen Cypher IIlemmy.worldDamaskox@lemmy.world · 1 year agomessage-square4fedilink
Damaskox@lemmy.world · 1 year agoPigpen Cypher Ilemmy.worldimagemessage-square4fedilinkarrow-up116arrow-down11
arrow-up115arrow-down1imagePigpen Cypher Ilemmy.worldDamaskox@lemmy.world · 1 year agomessage-square4fedilink
cyph3rPunk@infosec.pubM · 1 year agoHow the Best Hackers Learn Their Craft [42:46]plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkHow the Best Hackers Learn Their Craft [42:46]plus-squareyoutu.becyph3rPunk@infosec.pubM · 1 year agomessage-square0fedilink
demesisx@lemmy.worldEnglish · edit-21 year agoTETRA Vulnerability (TETRA:BURST) - Computerphile (18:43)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1external-linkTETRA Vulnerability (TETRA:BURST) - Computerphile (18:43)plus-squareyoutu.bedemesisx@lemmy.worldEnglish · edit-21 year agomessage-square0fedilink
demesisx@infosec.pubEnglish · 1 year agoWhy a true privacy tool can’t be built to comply with the State w/ Alan Szepieniecplus-squareodysee.comexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-linkWhy a true privacy tool can’t be built to comply with the State w/ Alan Szepieniecplus-squareodysee.comdemesisx@infosec.pubEnglish · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 1 year agoAll cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows (47:30)plus-squareyoutu.beexternal-linkmessage-square1fedilinkarrow-up132arrow-down11
arrow-up131arrow-down1external-linkAll cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows (47:30)plus-squareyoutu.becyph3rPunk@infosec.pubM · 1 year agomessage-square1fedilink
cyph3rPunk@infosec.pubM · 1 year ago"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022) (40:30)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up113arrow-down10
arrow-up113arrow-down1external-link"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022) (40:30)plus-squareyoutu.becyph3rPunk@infosec.pubM · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubMEnglish · 1 year agoPublic Key Cryptography - Computerphile (6:19)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1external-linkPublic Key Cryptography - Computerphile (6:19)plus-squareyoutu.becyph3rPunk@infosec.pubMEnglish · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubMEnglish · edit-21 year agoLet's Discuss the Potential for Vulnerability Here: Why you should check your secrets into Git | Warren Parad (55:08)plus-squareyoutu.beexternal-linkmessage-square2fedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkLet's Discuss the Potential for Vulnerability Here: Why you should check your secrets into Git | Warren Parad (55:08)plus-squareyoutu.becyph3rPunk@infosec.pubMEnglish · edit-21 year agomessage-square2fedilink