cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-21 month agoMigration to Post-Quantum Cryptography Quantum Readiness: Cryptographic Discoveryplus-squarewww.nccoe.nist.govexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMigration to Post-Quantum Cryptography Quantum Readiness: Cryptographic Discoveryplus-squarewww.nccoe.nist.govcyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-21 month agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-23 months ago38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up116arrow-down10
arrow-up116arrow-down1external-link38C3 - We've not been trained for this: life after the Newag DRM disclosureplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-23 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-23 months agoDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.netexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkDEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashingplus-squareinv.nadeko.netcyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-23 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 6 months agoDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxyoutu.beexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkDEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Coxyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 6 months agomessage-square0fedilink
minus-squarecyph3rPunk@infosec.pubtoPrivacy@lemmy.ml•Use a password managerlinkfedilinkarrow-up1arrow-down7·8 months agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubtoAsk Lemmy@lemmy.world•What are some niche communities on Lemmy do you think do not get enough attention but in your opinion are secretly awesome?linkfedilinkarrow-up5arrow-down1·9 months agodeleted by creator linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 9 months agonew vulnerability in your motherboardplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linknew vulnerability in your motherboardplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 9 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 10 months agoXenoRAT | Malware of the Dayplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkXenoRAT | Malware of the Dayplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 10 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 11 months agoThe Unbreakable Kryptos Codeyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Unbreakable Kryptos Codeyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 11 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agoMalicious Backdoor in xz liblzmaplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalicious Backdoor in xz liblzmaplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agonew linux exploit is absolutely insaneyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linknew linux exploit is absolutely insaneyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agoBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.beexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agomessage-square1fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-21 year agoHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-21 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agoHow to Start a War With a Flash Drive (31:45)youtu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Start a War With a Flash Drive (31:45)youtu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agoAdvanced Meshtastic Seriesplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAdvanced Meshtastic Seriesplus-squarewww.youtube.comcyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agoTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agoDarknet Diaries: True stories from the dark side of the Internetplus-squaredarknetdiaries.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDarknet Diaries: True stories from the dark side of the Internetplus-squaredarknetdiaries.comcyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agomessage-square1fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agoHow the Best Hackers Learn Their Craft [42:46]youtu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow the Best Hackers Learn Their Craft [42:46]youtu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agoAll cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows (47:30)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAll cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows (47:30)plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years ago"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022) (40:30)youtu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022) (40:30)youtu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 2 years agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pubEnglish · 2 years agoPublic Key Cryptography - Computerphile (6:19)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPublic Key Cryptography - Computerphile (6:19)plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pubEnglish · 2 years agomessage-square0fedilink
cyph3rPunk@infosec.pub to RiscV@lemmy.worldEnglish · 2 years agoLichee Pi 4A: Serious RISC-V Desktop Computing (19:13)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLichee Pi 4A: Serious RISC-V Desktop Computing (19:13)plus-squareyoutu.becyph3rPunk@infosec.pub to RiscV@lemmy.worldEnglish · 2 years agomessage-square0fedilink
deleted by creator