@anon
sign up
@anon
sign up
iLeakage: Browser-Based Timerless Speculative Execution Attacks on Apple Devices
ileakage.com/
130 sats
\
1 comment
\
@hn
25 Oct 2023
tech
related
Announcing LNsploit - A LN exploit tool
38.8k sats
\
24 comments
\
@TonyGiorgio
11 Oct 2022
bitcoin
Operation Triangulation: The last (hardware) mystery
securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
3855 sats
\
7 comments
\
@k00b
28 Dec 2023
security
Domain Spoofing Mutiny Walletโs Website
www.psacramento.com/domain-spoofing-mutiny-a-web-based-bitcoin-wallet/
4926 sats
\
5 comments
\
@psacramento
15 Feb
bitcoin
freebie
[bitcoin-dev] OP_Expire: Making HTLCs Safer by Letting Transactions Expire
lists.linuxfoundation.org/pipermail/bitcoin-dev/2023-October/022042.html
3751 sats
\
7 comments
\
@anon
21 Oct 2023
bitcoin
Dark Skippy Disclosure - A Powerful Method For Key Exfil Attacks
darkskippy.com
23.3k sats
\
11 comments
\
@utxoclub
5 Aug
security
My Extreme Privacy Journey - PART 2: GrapheneOS
20k sats
\
10 comments
\
@runningbitcoin
2 Nov
tutorials
New Linux glibc flaw lets attackers get root on major distros
www.bleepingcomputer.com/news/security/new-linux-glibc-flaw-lets-attackers-get-root-on-major-distros/
731 sats
\
11 comments
\
@ch0k1
1 Feb
security
New chip flaw hits Apple Silicon and steals cryptographic keys from system cache
www.tomshardware.com/pc-components/cpus/new-chip-flaw-hits-apple-silicon-and-steals-cryptographic-keys-from-system-cache-gofetch-vulnerability-attacks-apple-m1-m2-m3-processors-cant-be-fixed-in-hardware
925 sats
\
5 comments
\
@ch0k1
22 Mar
security
Novel attack against virtually all VPN apps neuters their entire purpose
arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/
1414 sats
\
28 comments
\
@k00b
7 May
privacy
60 Days of the Impervious Browser (Alpha) in the Wild ๐ ๐ผ๐
newsletter.impervious.ai/60-days-of-the-impervious-browser-alpha-in-the-wild-2/
305 sats
\
5 comments
\
@AR0w
14 Aug 2023
bitcoin
[bitcoin-dev] MATT: [demo] Optimistic execution of arbitrary programs
lists.linuxfoundation.org/pipermail/bitcoin-dev/2023-September/021974.html
233 sats
\
1 comment
\
@Rsync25
30 Sep 2023
bitcoin
PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Devices
thehackernews.com/2024/09/new-pixhell-attack-exploits-screen.html
757 sats
\
2 comments
\
@ch0k1
10 Sep
security
Zero-day Vulnerability in Ubiquitous Lib Puts Millions at Risk
restoreprivacy.com/zero-day-vulnerability-in-ubiquitous-lib-puts-millions-at-risk/
1287 sats
\
1 comment
\
@0fje0
24 Sep 2023
tech
Taping over your webcam not enough โ device's ambient light sensor used to spy
www.tomshardware.com/cameras/hackers-may-be-able-to-spy-on-you-using-a-devices-ambient-light-sensor
288 sats
\
6 comments
\
@DEADBEEF
1 Feb
privacy
Hertzbleed: a New Family of Side Channel Attacks
www.hertzbleed.com/
292 sats
\
2 comments
\
@CypherPoet
15 Jun 2022
bitcoin
Critical Unauthenticated RCE Flaw Impacts all GNU/Linux systems
cybersecuritynews.com/critical-unauthenticated-rce-flaw/
349 sats
\
1 comment
\
@ch0k1
24 Sep
news
๐งต Thread outlining the features of the upcoming Impervious Browser
twitter.com/ImperviousAi/status/1553414941733945344
340 sats
\
6 comments
\
@CypherPoet
30 Jul 2022
bitcoin
Apple fixes two new iOS zero-days exploited in attacks on iPhones
www.bleepingcomputer.com/news/apple/apple-fixes-two-new-ios-zero-days-exploited-in-attacks-on-iphones/
131 sats
\
0 comments
\
@ch0k1
6 Mar
security
The Rise Of User-Hostile Software
den.dev/blog/user-hostile-software/
2777 sats
\
7 comments
\
@slatheredloss
24 Dec 2022
bitcoin
Research Reveals How iPhone Push Notifications Leak User Data
www.macrumors.com/2024/01/25/push-notifications-leak-user-data/
392 sats
\
0 comments
\
@DEADBEEF
25 Jan
privacy
Hacker Leaks Claimed Apple Internal Software Development Tools
cyberinsider.com/hacker-leaks-claimed-apple-internal-software-development-tools/
540 sats
\
1 comment
\
@Car
20 Jun
privacy
more