With the small caveat that it will probably get me killed one day, my favorite tactic is blasting this and staring the guy down, expressionless, without breaking eye contact until he gets the hint.
Programs aren’t capable of generating true random numbers, so how can we? Are they even useful? Dr Valerio Giuffrida demonstrates how to get a true random number from most computers.
My first espresso machine, a rocket appartamento, has turned into a testbed for all my ideas of how much technology you can pack into an espresso machine. Let me share what I’ve done, and please ask about what you would like to hear more of!...
In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and security analysis of the proprietary cryptography used in TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, prisons, emergency services and...
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography...
Sipeed Lichee Pi 4A RISC-V SBC review and Debian demo. This is the first RISC-V computer I’ve tested that’s provided a usable desktop computing experience right out of the box. End-user RISC-V is starting to arrive! :)...
The Unbreakable Kryptos Code (youtu.be)
Malicious Backdoor in xz liblzma (youtu.be)
Backdoor found in xz liblzma specifically targets the RSA implementation of OpenSSH. Story still developing.https://openwall.com/lists/…/2…
new linux exploit is absolutely insane (youtu.be)
Broadcast LoRa packets WITHOUT a radio (youtu.be)
AI summary of transcript:...
The Best Password Managers in 2024 (blog.thenewoil.org)
2023 was a record-breaking year for cybersecurity in a bad way. Ransomware payments hit a record high of $1.1 billion, which is likely to…
Man playing music out loud on train: What are our options? [Update: Solved]
Least passive aggressive brit...
Charles on Selective Disclosure Regimes using Midnight (youtu.be)
Hosky speaks at length about selective disclosure regimes using Midnight....
How To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKEN (youtu.be)
DO NOT try this EVER....
How to Start a War With a Flash Drive (31:45) (youtu.be)
Advanced Meshtastic Series (www.youtube.com)
Welcome to the Advanced Meshtastic Series. We’ll be getting into some of the more advanced things you can do with Meshtastic.
Top 10 Most Notorious Hackers of All Time [Black Hat] (usa.kaspersky.com)
Top 10 Most Notorious Hackers of All Time...
True Random Numbers - Computerphile (12:15) (youtu.be)
Programs aren’t capable of generating true random numbers, so how can we? Are they even useful? Dr Valerio Giuffrida demonstrates how to get a true random number from most computers.
Darknet Diaries: True stories from the dark side of the Internet (darknetdiaries.com)
I just learned about this podcast today. Enjoy!
How the Best Hackers Learn Their Craft [42:46] (youtu.be)
Qubes OS - First Impressions (youtu.be)
my first impressions of qubes os the reasonably secure operating system
This Guy Built an Endgame Rocket Espresso Machine | An Engineer's Rocket Appartamento Mods [12:12] (youtu.be)
My first espresso machine, a rocket appartamento, has turned into a testbed for all my ideas of how much technology you can pack into an espresso machine. Let me share what I’ve done, and please ask about what you would like to hear more of!...
All cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows (47:30) (youtu.be)
In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and security analysis of the proprietary cryptography used in TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, prisons, emergency services and...
Formal Methods for the Working DeFi Dev by Rikard Hjort | Devcon Bogota (1:03:31) (youtu.be)
"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022) (40:30) (youtu.be)
Public Key Cryptography - Computerphile (6:19) (youtu.be)
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography...
Lichee Pi 4A: Serious RISC-V Desktop Computing (19:13) (youtu.be)
Sipeed Lichee Pi 4A RISC-V SBC review and Debian demo. This is the first RISC-V computer I’ve tested that’s provided a usable desktop computing experience right out of the box. End-user RISC-V is starting to arrive! :)...
Let's Discuss the Potential for Vulnerability Here: Why you should check your secrets into Git | Warren Parad (55:08) (youtu.be)
Slides - https://authress.io/l/codemotion...
Hacker interview-Gummo with follow-up (youtu.be)
Soft White Underbelly interview and portrait of Gummo, a computer hacker from Jacksonville, Florida....
Video-Based Cryptanalysis [3:00] (youtu.be)
Video-Based Cryptanalysis
Vitalik Buterin explains Ethereum (youtu.be)
Ethereum is a platform that makes it possible for any developer to write and distribute next-generation decentralized applications....