https://youtu.be/rsd-LwCyY4s

The headline was bit sensationalist. So, I shortened it.

17
0
https://youtu.be/II9ItxH0iHY

> A video summary by Faan Rossouw of the Malware of the Day - XenoRAT/// > 🔗 Blog post located here: https://www.activecountermeasures.com/malware-of-the-day-xenorat/

7
1
https://youtu.be/jqjtNDtbDNI

> Backdoor found in xz liblzma specifically targets the RSA implementation of OpenSSH. Story still developing.https://openwall.com/lists/oss-security/2024/03/2...

17
0
https://youtu.be/eIdHBDSQHyw

AI summary of transcript: > groundbreaking exploration into transmitting LoRaWAN signals via unconventional means—utilizing microcontrollers lacking native radio functionalities. By tweaking GPIO pins on devices like the CH32V203, ESP32-S2, and ESP8266, OP demonstrates how to generate RF signals strong enough to communicate with commercial LoRaWAN gateways and access the internet. This method deviates from traditional approaches that rely on specific radio chips or RF capabilities. The experiment not only surpasses expectations in terms of signal transmission distance but also showcases a novel blend of ingenuity and technical prowess. Through this project, the resilience and adaptability of LoRa technology are put on full display, proving its capability to facilitate long-range communications under inventive conditions. The venture into RF technology and signal generation through hardware manipulation opens new avenues for utilizing microcontrollers in ways previously deemed impractical, marking a significant achievement in the field.

41
4
https://youtu.be/e_SYSA2oSQI?t=2778

Hosky speaks at length about selective disclosure regimes using Midnight. Privacy protocol closed devnet opens up soon.

4
0
https://youtu.be/EFLvHMJ5PHk?si=896xZKdlDpTCfW4q

# DO NOT try this EVER. The feds **will** show up at your house and arrest you in less than 30 minutes.

36
0
"Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearRE
Jump
Cybertruck Owners Are Reporting Barely 200 Miles Per Charge
  • cyph3rPunk cyph3rPunk Now 100%
    1
  • https://www.youtube.com/watch?v=x99R78fkSg0&list=PLshzThxhw4O4--klTjqDzR6KeJyqXNNXI&pp=iAQB

    > Welcome to the Advanced Meshtastic Series. We'll be getting into some of the more advanced things you can do with Meshtastic.

    11
    0
    https://youtu.be/aEJB8IAMMpA?si=yPAhx5CCMKTZziya

    > Programs aren't capable of generating true random numbers, so how can we? Are they even useful? Dr Valerio Giuffrida demonstrates how to get a true random number from most computers.

    8
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearPR
    Jump
    Looking for a correct place to make a post about ciphering
  • cyph3rPunk cyph3rPunk Now 100%
    4
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearPR
    Jump
    Looking for a correct place to make a post about ciphering
  • cyph3rPunk cyph3rPunk Now 100%
    3
  • https://youtu.be/MXPBkWvlN8c?si=hjoqIYVlnDAGLsYW

    In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and security analysis of the proprietary cryptography used in TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, prisons, emergency services and military operators. Besides governemental applications, TETRA is also widely deployed in industrial environments such as factory campuses, harbor container terminals and airports, as well as critical infrastructure such as SCADA telecontrol of oil rigs, pipelines, transportation and electric and water utilities. For over two decades, the underlying algorithms have remained secret and bound with restrictive NDAs prohibiting public scrutiny of this highly critical technology. As such, TETRA was one of the last bastions of widely deployed secret proprietary cryptography. We will discuss in detail how we managed to obtain the primitives and remain legally at liberty to publish our findings.

    31
    1
    https://youtu.be/GSIDS_lvRv4?si=AbEgQvDnxB2au9bh

    > Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography > > note1: Yes, it should have been 'Obi Wan' not 'Obi One' :) > note2: The string of 'garbage' text in the two examples should have been different to illustrate more clearly that there are two different systems in use.

    16
    0
    https://youtu.be/bwpoo2bJWaQ?si=XQDD3aEQynDdhg4s

    > Slides - [https://authress.io/l/codemotion](https://docs.google.com/presentation/d/e/2PACX-1vSlrYb8nmtlH8HcVgBRhCnF3-A-Av8WG5YHe6Nte5ly49uL-Ug2JK7wQnPJ6FYi5VZ69vt49y3emLtj/pub?start=false&loop=false&delayms=30000&slide=id.p) > > Conference: > Codemotion Madrid 2023 > https://talks.codemotion.com/why-you-... Can someone recommend a more secure method? I've been told many times that using git for secret management would present a potential vulnerability.

    10
    2
    https://youtu.be/ITqBKRZvS3Y

    [Video-Based Cryptanalysis](https://www.nassiben.com/video-based-crypta)

    7
    1

    ![](https://www.protocol.com/media-library/vote-check.jpg?id=24672159&width=1245&height=700&quality=85&coordinates=7%2C0%2C8%2C0) > Using blockchain for voting could be risky, as the technology could introduce “new vulnerabilities” to elections, according to a new Government Accountability Office report. > > While some organizations have argued that blockchain-based systems would make elections more secure and easier to audit, “there might be added points of attack that could compromise elections,” the report said. > > “We talked to a number of experts who all indicated that they did not believe blockchain was the magic bullet answer for making voting systems more secure,” Karen Howard, the GAO’s director of Science, Technology Assessment and Analytics, told Protocol. > > The GAO report, titled “Blockchain: Emerging Technology Offers Benefits for Some Applications but Faces Challenges,” examined the potential of the technology, including in the public sector. Overall, the report “found that blockchain is useful for some applications but limited or even problematic for others.” > > “For example, because of its tamper resistance, it may be useful for applications involving many participants who do not necessarily trust each other,” the report said. “But it may be overly complex for a few trusted users, where traditional spreadsheets and databases may be more helpful.” > > One area where blockchain shows some promise is in supply chain management, Howard said. > > “The federal government is a major purchaser and supply chain tracking is a major function,” she said. The GAO found that blockchain technology could potentially be used “to replace or make more efficient” certain processes such as supply chain tracking and recording contracts, Howard said. --- *I disagree with this tiny little article, of course. But, I wanted to play devil's advocate for a moment on this idea.* --- Top Teddit comment by /u/denverpilot: > "Summary of article: > > Tracking things with a cryptographically solid chain of custody might be hard… because… hand wave… we like spreadsheets better and our admin level people are dumb. > > And we’ll distract and talk about supply chains instead because… that sounds more interesting… even though we were tasked with looking at voting. > > I don’t think the bureaucrat understood the assignment."

    2
    3
    cyph3rPunk Now
    78 3

    cyph3rPunk

    infosec.pub