minus-squarecyph3rPunk@infosec.pubtoPrivacy@lemmy.ml•Use a password managerlinkfedilinkarrow-up1arrow-down7·1 month agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubtoAsk Lemmy@lemmy.world•What are some niche communities on Lemmy do you think do not get enough attention but in your opinion are secretly awesome?linkfedilinkarrow-up4arrow-down1·2 months agodeleted by creator linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 3 months agonew vulnerability in your motherboardplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up116arrow-down11
arrow-up115arrow-down1external-linknew vulnerability in your motherboardplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 3 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 4 months agoXenoRAT | Malware of the Dayplus-squareyoutu.beexternal-linkmessage-square1fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkXenoRAT | Malware of the Dayplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 4 months agomessage-square1fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 5 months agoThe Unbreakable Kryptos Codeplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Unbreakable Kryptos Codeplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 5 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 6 months agoMalicious Backdoor in xz liblzmaplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMalicious Backdoor in xz liblzmaplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 6 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 6 months agonew linux exploit is absolutely insaneplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linknew linux exploit is absolutely insaneplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 6 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 6 months agoBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 6 months agomessage-square0fedilink
minus-squarecyph3rPunk@infosec.pubtoPrivacy@lemmy.ml•The Best Password Managers in 2024linkfedilinkarrow-up6arrow-down1·7 months agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubtoLinux@lemmy.ml•Warp for Linux, Rust-based Terminallinkfedilinkarrow-up45·7 months agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubtoLinux@lemmy.ml•Former distrohoppers, where did you settle down?linkfedilinkarrow-up5·7 months agodeleted by creator linkfedilink
cyph3rPunk@infosec.pub to Blockchain Voting@infosec.pub · 7 months agoCharles on Selective Disclosure Regimes using Midnightplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCharles on Selective Disclosure Regimes using Midnightplus-squareyoutu.becyph3rPunk@infosec.pub to Blockchain Voting@infosec.pub · 7 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-28 months agoHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · edit-28 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 8 months agoHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 8 months agomessage-square0fedilink
minus-squarecyph3rPunk@infosec.pubtoRealTesla@lemmy.world•Cybertruck Owners Are Reporting Barely 200 Miles Per ChargelinkfedilinkEnglisharrow-up1·8 months agodeleted by creator linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 9 months agoAdvanced Meshtastic Seriesplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAdvanced Meshtastic Seriesplus-squarewww.youtube.comcyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 9 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 11 months agoTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 11 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 11 months agoDarknet Diaries: True stories from the dark side of the Internetplus-squaredarknetdiaries.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDarknet Diaries: True stories from the dark side of the Internetplus-squaredarknetdiaries.comcyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 11 months agomessage-square0fedilink
minus-squarecyph3rPunk@infosec.pubtoGeneral Programming Discussion@lemmy.ml•Looking for a correct place to make a post about cipheringlinkfedilinkarrow-up3·1 year agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubtoGeneral Programming Discussion@lemmy.ml•Looking for a correct place to make a post about cipheringlinkfedilinkarrow-up2·1 year agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubtoTechnology@lemmy.world•New Raspberry Pi 5 comes with PCIe 2.0 x1 interface and power buttonlinkfedilinkEnglisharrow-up14arrow-down1·1 year agodeleted by creator linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agoHow the Best Hackers Learn Their Craft [42:46]plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow the Best Hackers Learn Their Craft [42:46]plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agomessage-square0fedilink
minus-squarecyph3rPunk@infosec.pubtoLinux@lemmy.ml•Did we kill Linux's killer feature?linkfedilinkarrow-up5·1 year agodeleted by creator linkfedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agoAll cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows (47:30)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAll cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows (47:30)plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pub to Ethereum@infosec.pubEnglish · edit-21 year agoFormal Verification for n00bs — Part 1: The K ecosystemplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFormal Verification for n00bs — Part 1: The K ecosystemplus-squaremedium.comcyph3rPunk@infosec.pub to Ethereum@infosec.pubEnglish · edit-21 year agomessage-square0fedilink
cyph3rPunk@infosec.pub to Cardano Developers@infosec.pub · 1 year agoFormal Methods for the Working DeFi Dev by Rikard Hjort | Devcon Bogota (1:03:31)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFormal Methods for the Working DeFi Dev by Rikard Hjort | Devcon Bogota (1:03:31)plus-squareyoutu.becyph3rPunk@infosec.pub to Cardano Developers@infosec.pub · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year ago"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022) (40:30)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022) (40:30)plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pub · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pubEnglish · 1 year agoPublic Key Cryptography - Computerphile (6:19)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPublic Key Cryptography - Computerphile (6:19)plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pubEnglish · 1 year agomessage-square0fedilink
cyph3rPunk@infosec.pub to RiscV@lemmy.worldEnglish · 1 year agoLichee Pi 4A: Serious RISC-V Desktop Computing (19:13)plus-squareyoutu.beexternal-linkmessage-square7fedilinkarrow-up133arrow-down10
arrow-up133arrow-down1external-linkLichee Pi 4A: Serious RISC-V Desktop Computing (19:13)plus-squareyoutu.becyph3rPunk@infosec.pub to RiscV@lemmy.worldEnglish · 1 year agomessage-square7fedilink
cyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pubEnglish · edit-21 year agoLet's Discuss the Potential for Vulnerability Here: Why you should check your secrets into Git | Warren Parad (55:08)plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLet's Discuss the Potential for Vulnerability Here: Why you should check your secrets into Git | Warren Parad (55:08)plus-squareyoutu.becyph3rPunk@infosec.pubM to cyph3rPunk@infosec.pubEnglish · edit-21 year agomessage-square0fedilink
minus-squarecyph3rPunk@infosec.pubtoAsklemmy@lemmy.ml•If you could travel to any fictional world, which one would you pick and what would you do there?linkfedilinkarrow-up1·1 year agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubtoAsklemmy@lemmy.ml•What are your favorite lemmy communities?linkfedilinkarrow-up3·1 year agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubtoAsklemmy@lemmy.ml•Why do each of my accounts have different subscription lists?linkfedilinkEnglisharrow-up0·1 year agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubtoPermacomputing@slrpnk.net•Hare is a boring programming languagelinkfedilinkEnglisharrow-up1·1 year agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubOPtoMemes@lemmy.ml•c'mon niche communitylinkfedilinkEnglisharrow-up2·1 year agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubOPtoMemes@lemmy.ml•c'mon niche communitylinkfedilinkEnglisharrow-up3·1 year agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubtoNew Communities@lemmy.world•A community for the discussion of Hardcore Punk!linkfedilinkEnglisharrow-up8·1 year agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubOPtoMemes@lemmy.ml•c'mon niche communitylinkfedilinkEnglisharrow-up1·1 year agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubOPtoMemes@lemmy.ml•c'mon niche communitylinkfedilinkEnglisharrow-up3·1 year agodeleted by creator linkfedilink
minus-squarecyph3rPunk@infosec.pubOPtoMemes@lemmy.ml•c'mon niche communitylinkfedilinkEnglisharrow-up3·1 year agodeleted by creator linkfedilink
deleted by creator