sign up
sign up
sign up
sign up
pull down to refresh
Millions of Internet Hosts Vulnerable to Attacks Due to Tunneling Protocol Flaws
www.securityweek.com/millions-of-internet-hosts-vulnerable-to-attacks-due-to-tunneling-protocol-flaws/
135 sats
\
0 comments
\
@ch0k1
19 Jan 2025
security
related
Privacy Pub 1 - Buy a VPN with Bitcoin + Firewalls
5980 sats
\
45 comments
\
@davidw
12 Jan 2024
privacy
Latest Strikes S03E06 - Janurary 5th - 18th 2026
1411 sats
\
0 comments
\
@fanis
21 Jan
bitcoin
lightning
Most Wi-Fi routers vulnerable to AirSnitch attack – here's what to do
9to5mac.com/2026/03/02/psa-most-wi-fi-routers-vulnerable-to-airsnitch-attack-heres-what-to-do/
130 sats
\
0 comments
\
@winteryeti
2 Mar
tech
Main Possible Vulnerabilities of a Router
470 sats
\
2 comments
\
@Azik
4 Apr 2024
security
Basic tips to improve your home network (translate)
310 sats
\
3 comments
\
@modobitcoin
16 Sep 2023
tech
freebie
Not in The Prophecies: Practical Attacks on Nostr
crypto-sec-n.github.io/
4110 sats
\
7 comments
\
@ek
7 Aug 2025
nostr
An Ode to The Onion Router (Tor)
2753 sats
\
19 comments
\
@nullcount
24 Sep 2022
bitcoin
Cyberspies Hacked Cisco Firewalls to Access Government Networks
www.wired.com/story/arcanedoor-cyberspies-hacked-cisco-firewalls-to-access-government-networks/
48 sats
\
0 comments
\
@nym
25 Apr 2024
security
Massive brute force attack uses 2.8 million IPs to target VPN devices
www.bleepingcomputer.com/news/security/massive-brute-force-attack-uses-28-million-ips-to-target-vpn-devices/
336 sats
\
1 comment
\
@ch0k1
8 Feb 2025
security
New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/
153 sats
\
0 comments
\
@winteryeti
26 Feb
tech
TorVPN + OnionMasq + Oniux: A New Paradigm in Mobile Privacy and for Bitcoiners
402 sats
\
0 comments
\
@villawolf
3 Oct 2025
DIY
End-to-end encrypted, peer-to-peer VPN tunnels for hackers
reliquary.se
167 sats
\
0 comments
\
@nym
7 Jan 2025
security
5/9/14 Eyes Countries & VPNs: What You Need to Know (2024)
130 sats
\
1 comment
\
@RootTerminal
12 Jan 2024
privacy
Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infra
thehackernews.com/2026/03/web-server-exploits-and-mimikatz-used.html
50 sats
\
0 comments
\
@ch0k1
9 Mar
news
fips: free internetworking pairing system · jmcorgan
github.com/jmcorgan/fips/blob/master/docs/design/fips-intro.md
2765 sats
\
10 comments
\
@Scoresby
25 Feb
nostr
Not like this: researchers pen open letter on the dangers of age verification
www.pcgamer.com/hardware/scientists-warn-against-crappy-age-verification-if-implemented-without-careful-consideration-the-new-regulation-might-cause-more-harm-than-good/
404 sats
\
1 comment
\
@Scoresby
4 Mar
tech
Politics_And_Law
Who Owns, Operates, and Develops Your VPN Matters - New Research Report
www.opentech.fund/news/who-owns-operates-and-develops-your-vpn-matters-an-analysis-of-transparency-vs-anonymity-in-the-vpn-ecosystem-and-implications-for-users/
2430 sats
\
11 comments
\
@Scoresby
10 Oct 2025
privacy
WiFi hackers can bypass WPA3 security by exploiting its weakest link: the user
cybernews.com/security/wifi-hackers-can-bypass-wpa3-security/
272 sats
\
9 comments
\
@ch0k1
29 Dec 2024
security
TunnelSats v3: Public API, NWC Login & New CLI
1654 sats
\
22 comments
\
@Hakuna
8 Jan
lightning
Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon
publications.cispa.saarland/3996/1/Investigating_Security_Folklore__The_Case_Study_of_the_Tor_over_VPN_Phenomenon__CSCW_2023.pdf
547 sats
\
0 comments
\
@Kathleen_Croteau
9 Feb 2024
security
Lightning Network: Protocol Maturity and Adoption
2461 sats
\
13 comments
\
@realtrader
3 Aug 2023
bitcoin
more