The Day I Hacked XCTrack
blog.syrac.orgยท4hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
INFER : Learning Implicit Neural Frequency Response Fields for Confined Car Cabin
arxiv.orgยท15h
๐Ÿ‘‚Psychoacoustic Coding
Michael Kohn - tin can phone modem
mikekohn.netยท2h
๐ŸงชCassette Hacks
Sorting encrypted data without decryption: a practical trick
dev.toยท4hยท
Discuss: DEV
๐Ÿ”Hash Functions
Att&Df: Update the Operating System's "Dead Drop"
zenodo.orgยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
High-Tech Sensors Expose the Secret Tricks of Piano Masters
scitechdaily.comยท14h
๐ŸŒˆSpectral Audio
A small rant about compression
codecs.multimedia.cxยท2d
๐Ÿ“ฆDeflate
VoIP Eavesdropping: How it Works, Threats & Defense Tactics
enablesecurity.comยท1d
๐ŸŒNetwork Security
You Can Get This Waterproof, Portable Skullcandy Speaker on Sale for $33 Right Now
lifehacker.comยท1h
๐Ÿ“กBluetooth Archaeology
ClayRat campaign uses Telegram and phishing sites to distribute Android spyware
securityaffairs.comยท23h
๐Ÿ•ต๏ธVector Smuggling
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
infosecwriteups.comยท7h
๐Ÿ Homelab Federation
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท6h
๐Ÿ›กCybersecurity
Study Finds Over 77% of Mobile Apps Leak Sensitive Data and Pose Privacy Risks
zimperium.comยท6h
๐Ÿ›กCybersecurity
The Why of PGP Authentication
articles.59.caยท6h
๐Ÿ”‘Cryptographic Protocols
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comยท7h
๐Ÿ”“Hacking
Alexander Fehrmann: How To Analyze Impression Evidence In Amped FIVE
forensicfocus.comยท1d
๐Ÿ”Binary Forensics
Poland charges former registry office employee with providing false identities for Russian spies
the-independent.comยท1d
๐Ÿ”Polish Cryptanalysis
High-Quality Video Tape Conversion for Homes and Businesses
forums.anandtech.comยท12h
๐Ÿ“ผTape Simulation