@patrickcmiller interesting how the vulnerability is known but the new and innovative ways to abuse it are the news.
Also: second reason in a week to look at the flipper zero while I already have a proxmark3
@patrickcmiller interesting how the vulnerability is known but the new and innovative ways to abuse it are the news.
Also: second reason in a week to look at the flipper zero while I already have a proxmark3
@patrickcmiller it seems ACME corporation can still deliver a fake wall when needed!
@ryanc I have read about a trick with a short-circuit across the clock crystal to stop bootup from happening.
@ryanc this may save some people from making errors
@ryanc later we had pump'n'dump spam with the stock symbol hiding in an image
@ryanc just put WIN98 in the right DHCP field
@ryanc keep us posted!
Especially on the finding a vulnerability part. I suspect a pwn2own entry in the future
@patrickcmiller again? No wait: still??
I ran into these GasPots fuel stations by accident in a shodan search. I'm amused it's still ongoing
@patrickcmiller listennotes comes (for me) with ads that smell somewhere on the scale 'malware', 'adware' or 'serious privacy issue'.
I also find it at https://podcastindex.org/podcast/1427467 which seems to have less advertising.
And I will check out this podcast, thanks for sharing that.
@patrickcmiller while the data-collecting by US firms is just fine?
@patrickcmiller I miss "standing in line for security"...
Father, recumbent cyclist, technical security specialist at work, book lover, cat owned, snowboarder, linux user, ipv6 fan, radio amateur @PE4KH
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.