![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://infosec.pub/pictrs/image/41118f2b-c046-484c-8fe8-5e85b71f5b50.jpeg)
I wonder if you could attract the victims of disinformation/misinformation by using the same methods… “80% of people fail this test - can you figure it out?”
I wonder if you could attract the victims of disinformation/misinformation by using the same methods… “80% of people fail this test - can you figure it out?”
To add to this, self-hosting is also best when you minimize everything - limited service, with limited functionality, on dedicated hardware that doesn’t share access to your internal network or storage. Folks who use point-and-click apps to install a half dozen unauthenticated docker containers, all open to the internet, running on the same PC they store the only copy of their family photos and music/movie collection on… make me crazy.
You’re getting money back from a scam. Be happy you got anything at all.
A lot of time, effort, and money could have been saved by responding with “Sign a message on the blockchain with your keys or GTFO.” Oh, you lost your keys to those very earliest blocks? GTFO. But you have an eMail? GTFO.
TL;DR: Horny people don’t read privacy policies.
“I can’t believe that the cheap, sketchy, unregulated hotel from some website on the internet that I stayed in behaved in an unprofessional manner” says a chorus of ignorant morons.
If you don’t like how your non-hotel is treating you, consider staying at an actual hotel next time.
That’s stupid. You should be doing everything you can to get them to visit the USA… So you can arrest them, jail them, then exploit them.
“Citizens call for solutions to access police records in serious crime cases”
All the reasons that government won’t use backdoored encryption are all the reasons WE can’t use backdoored encryption.
Not strictly teh ciberrz, but upgrading to OpenBSD 7.5. Might rebuild a mail server this weekend.
Yeah, Google’s big, but they’re not ‘take on the chinese mob’ big.
I use it for managing the RFID keyfobs for my building. I can keep copies of each apartment’s fobs – which makes it trivially easy to disable lost fobs by using the ‘delete’ fob, followed by the lost fob (or all of the fobs for a specific resident), then re-enable new ones.
I’ve also played with the NFC toys, but the built-in capabilities are rather limited. I was able to copy a RFID hotel room key (a room which I was staying in) by cracking keys with the F0 itself, which just shows how terribly weak these things are.
I haven’t been able to use the SubGHz module to do anything particularly interesting aside from cloning a remote control for a fan and an LED light.
It’s a neat toy, and it absolutely exposes how trivially easy it is to break access control systems.
Uh, once data is immutable… What happens to the data that ransomwave does manage to corrupt?
If a website you’re using uses SMS for 2FA, then you seriously need to switch companies.
It’s probably already covered under a dozen other laws like fraud, voter tampering, etc.
Literally any laptop with a WiFi chip can do this. And probably most phones and tablets. And Raspberry Pi’s. Hell, even WiFi routers have all the features and functionality to do this.
I can also steal a Tesla with a $5 wrench by beating the driver until they give me the keys. Nobody’s outlawing wrenches.
What? The black market is sketchy and unreliable? Unbelievable.
Coming soon… Metaware! Malware, from Meta, that’s AWARE of your every move…
The country currently conducting a genocide, having been created after their religious siblings were genocided… And you’re asking how they get away with… software…
Talk about asking the wrong questions.
FYI, lots of digital ad screens that you see in malls, in the subway, or out on the street have them. Black electrical tape is a good way to block them when you find them.
Uh… So who is paying for that right now?