Skip Navigation
Posts
79
Comments
2
Joined
2 yr. ago
cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

The Greatest Hack in History

Cardano @infosec.pub
cyph3rPunk @infosec.pub

Cardano Governing Board Update

Dear Members,

Over the past few weeks, the Intersect Board of Directors has been actively gathering feedback from our members by engaging with various committees - such as the Steering, Product, and Technical Steering Committees - following the concerns they raised while remaining open to discussions with all committees. 
\
\ Our goal is to address your concerns about the budget process and broader governance issues in a timely and transparent manner. 
\
\ We recognize that the changes to the budget process are still evolving and require further refinement. Thank you for your patience and support as we work together to address these challenges - particularly the need to support the Cardano ecosystem by unlocking funding promptly yet responsibly. We also appreciate the thoughtful input you’ve provided and have taken steps to ensure at least one Board member attends each committee’s meeting on a quarterly basis, so we can continue listening and learning directly.

We have also reached out

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

Migration to Post-Quantum Cryptography Quantum Readiness: Cryptographic Discovery

Different post-quantum algorithms can have significantly different performance characteristics and implementation constraints (with respect to key sizes, signature sizes, resource requirements, etc.). Consequently, different algorithms can be more suitable than others for specific applications. For example, the signature or key size might not be a problem for some applications but can be unacceptable for others. Some widely used protocols need to be modified to handle larger signatures or key sizes (e.g., using message segmentation). Implementations of new applications will need to accommodate the demands of post-quantum cryptography (pqc) and the schemes developed that incorporate pqc for digital signatures and key establishment. In fact, pqc requirements may actually shape some future application standards. The replacement of algorithms generally requires changing or replacing cryptographic libraries, implementation validation tools, hardware that implements or accelerates algor

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

38C3 - We've not been trained for this: life after the Newag DRM disclosure

Formal Methods @programming.dev
cyph3rPunk @infosec.pub

Verified Effectful Programming in F* - Catalin Hritcu

I noticed that not many people in the formal methods world have even heard of F Star. From what I’m told, it goes even further than Agda and Coq in proving correctness. I’d like to understand why if someone would explain.

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

DEF CON 32 - Inside the FBI's Secret Encrypted Phone Company 'Anom' - Joseph Cox

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

new vulnerability in your motherboard

The headline was bit sensationalist. So, I shortened it.

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

XenoRAT | Malware of the Day

A video summary by Faan Rossouw of the Malware of the Day - XenoRAT///

🔗 Blog post located here: https://www.activecountermeasures.com/malware-of-the-day-xenorat/

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

The Unbreakable Kryptos Code

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

Malicious Backdoor in xz liblzma

Backdoor found in xz liblzma specifically targets the RSA implementation of OpenSSH. Story still developing.https://openwall.com/lists/oss-security/2024/03/2...

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

new linux exploit is absolutely insane

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

Broadcast LoRa packets WITHOUT a radio

AI summary of transcript:

groundbreaking exploration into transmitting LoRaWAN signals via unconventional means—utilizing microcontrollers lacking native radio functionalities. By tweaking GPIO pins on devices like the CH32V203, ESP32-S2, and ESP8266, OP demonstrates how to generate RF signals strong enough to communicate with commercial LoRaWAN gateways and access the internet. This method deviates from traditional approaches that rely on specific radio chips or RF capabilities. The experiment not only surpasses expectations in terms of signal transmission distance but also showcases a novel blend of ingenuity and technical prowess. Through this project, the resilience and adaptability of LoRa technology are put on full display, proving its capability to facilitate long-range communications under inventive conditions. The venture into RF technology and signal generation through hardware manipulation opens new avenues for utilizing microcontrollers in ways previously deemed impracti

Blockchain Voting @infosec.pub
cyph3rPunk @infosec.pub

Charles on Selective Disclosure Regimes using Midnight

Hosky speaks at length about selective disclosure regimes using Midnight.

Privacy protocol closed devnet opens up soon.

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

How To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKEN

DO NOT try this EVER.

The feds will show up at your house and arrest you in less than 30 minutes.

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

How to Start a War With a Flash Drive (31:45)

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

Advanced Meshtastic Series

Welcome to the Advanced Meshtastic Series. We'll be getting into some of the more advanced things you can do with Meshtastic.

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

True Random Numbers - Computerphile (12:15)

Programs aren't capable of generating true random numbers, so how can we? Are they even useful? Dr Valerio Giuffrida demonstrates how to get a true random number from most computers.

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

Darknet Diaries: True stories from the dark side of the Internet

I just learned about this podcast today. Enjoy!

cyph3rPunk @infosec.pub
cyph3rPunk @infosec.pub

How the Best Hackers Learn Their Craft