The Day I Hacked XCTrack
blog.syrac.orgยท10hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
INFER : Learning Implicit Neural Frequency Response Fields for Confined Car Cabin
arxiv.orgยท21h
๐Ÿ‘‚Psychoacoustic Coding
Michael Kohn - tin can phone modem
mikekohn.netยท8h
๐ŸงชCassette Hacks
Sorting encrypted data without decryption: a practical trick
dev.toยท10hยท
Discuss: DEV
๐Ÿ”Hash Functions
Att&Df: Update the Operating System's "Dead Drop"
zenodo.orgยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
High-Tech Sensors Expose the Secret Tricks of Piano Masters
scitechdaily.comยท20h
๐ŸŒˆSpectral Audio
A small rant about compression
codecs.multimedia.cxยท2d
๐Ÿ“ฆDeflate
VoIP Eavesdropping: How it Works, Threats & Defense Tactics
enablesecurity.comยท2d
๐ŸŒNetwork Security
You Can Get This Waterproof, Portable Skullcandy Speaker on Sale for $33 Right Now
lifehacker.comยท7h
๐Ÿ“กBluetooth Archaeology
UNREDACTED Magazine Issue 009
inteltechniques.comยท2h
๐Ÿ“กRSS Readers
ClayRat campaign uses Telegram and phishing sites to distribute Android spyware
securityaffairs.comยท1d
๐Ÿ•ต๏ธVector Smuggling
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
infosecwriteups.comยท13h
๐Ÿ Homelab Federation
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท12h
๐Ÿ›กCybersecurity
The Underscore Music Player
kottke.orgยท5h
๐Ÿ’ฟFLAC Archaeology
Study Finds Over 77% of Mobile Apps Leak Sensitive Data and Pose Privacy Risks
zimperium.comยท12h
๐Ÿ›กCybersecurity
The Why of PGP Authentication
articles.59.caยท12h
๐Ÿ”‘Cryptographic Protocols
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comยท13h
๐Ÿ”“Hacking
Alexander Fehrmann: How To Analyze Impression Evidence In Amped FIVE
forensicfocus.comยท1d
๐Ÿ”Binary Forensics