@anon
sign up
@anon
sign up
pull down to refresh
Listen to the whispers: web timing attacks that actually work
portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work
94 sats
\
0 comments
\
@Rsync25
21 Nov
tech
related
An Ode to The Onion Router (Tor)
2743 sats
\
19 comments
\
@nullcount
24 Sep 2022
bitcoin
The Art of Invisibility by Kevin Mitnick | Mitnick Security
www.mitnicksecurity.com/the-art-of-invisibility-mitnick-security
2366 sats
\
21 comments
\
@ek
23 Feb
privacy
The Gentleperson’s Guide to Forum Spies
ronaldthomaswest.com/2017/08/21/the-gentlepersons-guide-to-forum-spies/
2805 sats
\
14 comments
\
@Coyote_Cosmico
29 Sep
culture
Dark Skippy Disclosure - A Powerful Method For Key Exfil Attacks
darkskippy.com
23.3k sats
\
11 comments
\
@utxoclub
5 Aug
security
Post-Mortem on the Lightning Network Replacement Cycling Attack
bitcoinmagazine.com/technical/postmortem-on-the-lightning-replacement-cycling-attack
1691 sats
\
7 comments
\
@kr
24 Oct 2023
bitcoin
He Investigates the Internet’s Most Vicious Hackers—From a Secret Location
archive.is/um1hv
364 sats
\
0 comments
\
@StillStackinAfterAllTheseYears
8 Dec
security
"Web Environment Integrity" is an all-out attack on the free Internet
www.fsf.org/blogs/community/web-environment-integrity-is-an-all-out-attack-on-the-free-internet
1716 sats
\
8 comments
\
@beorange
28 Jul 2023
tech
On hiding the creation date of internet content
1079 sats
\
20 comments
\
@SimpleStacker
23 Nov
Design
Slow Block Validation Attacks
blog.lopp.net/slow-block-validation-attacks/
1111 sats
\
1 comment
\
@k00b
20 Oct
bitcoin
How the Greatest Hacker Manipulated Everyone
youtu.be/aLUDhbQojxA?si=_DxItJ3aLBM7ZnCc
746 sats
\
6 comments
\
@Car
27 May
security
Cryptographers Are Getting Closer to Enabling Fully Private Internet Searches
www.wired.com/story/cryptographers-fully-private-internet-searches-cybersecurity-databases-privacy/
2587 sats
\
5 comments
\
@jakoyoh629
21 Jan
crypto
Web fingerprinting is worse than I thought
www.bitestring.com/posts/2023-03-19-web-fingerprinting-is-worse-than-I-thought.html
599 sats
\
15 comments
\
@shadowymartian
21 Mar 2023
bitcoin
PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Devices
thehackernews.com/2024/09/new-pixhell-attack-exploits-screen.html
757 sats
\
2 comments
\
@ch0k1
10 Sep
security
[FULL DISCLOSURE] Tx-Relay Throughput Overflow Attack against OffChain Protocols
2086 sats
\
0 comments
\
@theariard
5 Dec
bitcoin
Built On Bitcoin’s Lightning Network, BLIP Wants To Make Your Chats Unstoppable
bitcoinmagazine.com/business/blip-encrypted-chat-on-bitcoin-lightning
364 sats
\
8 comments
\
@029b92a10f
16 Nov 2022
bitcoin
Hertzbleed: a New Family of Side Channel Attacks
www.hertzbleed.com/
292 sats
\
2 comments
\
@CypherPoet
15 Jun 2022
bitcoin
This Undisclosed WhatsApp Vulnerability Lets Governments See Who You Message
theintercept.com/2024/05/22/whatsapp-security-vulnerability-meta-israel-palestine/
390 sats
\
5 comments
\
@sefiro
25 May
security
The Simple Math Behind Public Key Cryptography
www.wired.com/story/how-public-key-cryptography-really-works-using-only-simple-math/
589 sats
\
1 comment
\
@ch0k1
15 Dec
science
The Mirai Confessions: Hackers Who Built a Web-Killing Monster Tell Their Story
www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/
346 sats
\
0 comments
\
@k00b
14 Nov 2023
tech
Unchaining the Web
seha.cc/unchaining-the-web/
166 sats
\
0 comments
\
@cryptocoin
1 Aug 2022
bitcoin
Improving Browser Security with CSP (2011)
blog.twitter.com/engineering/en_us/a/2011/improving-browser-security-with-csp
757 sats
\
3 comments
\
@ek
9 Feb
security
more