@anon
sign up
@anon
sign up
iLeakage: Browser-Based Timerless Speculative Execution Attacks on Apple Devices
ileakage.com/
130 sats
\
1 comment
\
@hn
25 Oct 2023
tech
related
Announcing LNsploit - A LN exploit tool
38.8k sats
\
5000 boost
\
24 comments
\
@TonyGiorgio
11 Oct 2022
bitcoin
GrapheneOS discloses vulnerabilities actively exploited by forensic companies
5826 sats
\
7 comments
\
@final
12 Jan
security
Operation Triangulation: The last (hardware) mystery
securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
3855 sats
\
7 comments
\
@k00b
28 Dec 2023
security
Domain Spoofing Mutiny Wallet’s Website
www.psacramento.com/domain-spoofing-mutiny-a-web-based-bitcoin-wallet/
4926 sats
\
5 comments
\
@psacramento
15 Feb
bitcoin
freebie
[bitcoin-dev] OP_Expire: Making HTLCs Safer by Letting Transactions Expire
lists.linuxfoundation.org/pipermail/bitcoin-dev/2023-October/022042.html
3751 sats
\
7 comments
\
@anon
21 Oct 2023
bitcoin
Extreme Privacy: Mobile Devices
inteltechniques.com/blog/2023/02/16/extreme-privacy-mobile-devices/
2659 sats
\
4 comments
\
@runningbitcoin
17 Feb 2023
bitcoin
New Linux glibc flaw lets attackers get root on major distros
www.bleepingcomputer.com/news/security/new-linux-glibc-flaw-lets-attackers-get-root-on-major-distros/
731 sats
\
11 comments
\
@ch0k1
1 Feb
security
37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers
www.youtube.com/watch?v=1f6YyH62jFE
896 sats
\
4 comments
\
@ek
29 Dec 2023
security
New chip flaw hits Apple Silicon and steals cryptographic keys from system cache
www.tomshardware.com/pc-components/cpus/new-chip-flaw-hits-apple-silicon-and-steals-cryptographic-keys-from-system-cache-gofetch-vulnerability-attacks-apple-m1-m2-m3-processors-cant-be-fixed-in-hardware
925 sats
\
5 comments
\
@ch0k1
22 Mar
security
Molly: A fork of Signal for Android with password lock, RAM wiper, Tor support
github.com/mollyim/mollyim-android
1356 sats
\
5 comments
\
@final
28 Jun 2023
tech
60 Days of the Impervious Browser (Alpha) in the Wild 🎅🏼🎄
newsletter.impervious.ai/60-days-of-the-impervious-browser-alpha-in-the-wild-2/
305 sats
\
5 comments
\
@AR0w
14 Aug 2023
bitcoin
[bitcoin-dev] MATT: [demo] Optimistic execution of arbitrary programs
lists.linuxfoundation.org/pipermail/bitcoin-dev/2023-September/021974.html
233 sats
\
1 comment
\
@Rsync25
30 Sep 2023
bitcoin
Zero-day Vulnerability in Ubiquitous Lib Puts Millions at Risk
restoreprivacy.com/zero-day-vulnerability-in-ubiquitous-lib-puts-millions-at-risk/
1287 sats
\
1 comment
\
@0fje0
24 Sep 2023
tech
Taping over your webcam not enough — device's ambient light sensor used to spy
www.tomshardware.com/cameras/hackers-may-be-able-to-spy-on-you-using-a-devices-ambient-light-sensor
267 sats
\
6 comments
\
@DEADBEEF
1 Feb
privacy
Hertzbleed: a New Family of Side Channel Attacks
www.hertzbleed.com/
292 sats
\
2 comments
\
@CypherPoet
15 Jun 2022
bitcoin
🧵 Thread outlining the features of the upcoming Impervious Browser
twitter.com/ImperviousAi/status/1553414941733945344
340 sats
\
6 comments
\
@CypherPoet
30 Jul 2022
bitcoin
Apple already shipped attestation on the web, and we barely noticed
httptoolkit.com/blog/apple-private-access-tokens-attestation/
1940 sats
\
0 comments
\
@sebastix
3 Sep 2023
tech
The Rise Of User-Hostile Software
den.dev/blog/user-hostile-software/
2777 sats
\
7 comments
\
@slatheredloss
24 Dec 2022
bitcoin
Research Reveals How iPhone Push Notifications Leak User Data
www.macrumors.com/2024/01/25/push-notifications-leak-user-data/
392 sats
\
0 comments
\
@DEADBEEF
25 Jan
privacy
Hacker Leaks Claimed Apple Internal Software Development Tools
cyberinsider.com/hacker-leaks-claimed-apple-internal-software-development-tools/
540 sats
\
1 comment
\
@Car
20 Jun
privacy
The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind
www.wired.com/story/jia-tan-xz-backdoor/
523 sats
\
2 comments
\
@ch0k1
3 Apr
security
more