huh, so there's a #Telegram data breach of some sort and my details appear to be in it, although I have zero memory of ever using Telegram. I suppose it's possible that I briefly installed it as I /am/ likely to check secure & private messengers, but Telegram is actually neither of those things despite their claims.
So yeah, a bit confused that I'm in the list of compromised accounts on it but whatevs.
Mystery malware destroys 600,000 routers from a single ISP during 72-hour span:
An unknown threat actor with equally unknown motives forces ISP to replace routers.
One day last October, subscribers to an ISP known as Windstream began flooding message boards with reports their routers had suddenly stopped working and remained unresponsive to reboots and all other attempts to revive them.
Utiliser un tel #Android sans compte #Google c'est possible. A l'activation, au lieu de renseigner un compte, on choisit "ignorer". Conséquence, pas de Play Store, aucune importance : on installe F-Droid (magasin d'applis alternatif) et si on veut installer (ou mettre à jour) des applis qui viennent du Play Store on installe Aurora Store (la connexion au Play Store est alors anonyme) 😊 Pas de root nécessaire.
The further you dig, the farther the #history goes, so we settled on starting in 1906, then the 90's, then #Slackware. This is the history of #Xz that culminated into a " #hack " that would have rocked the world if not for one intrepid #SQL#developer.
Der #Hack: Dein #like & Dein #Teilen folgendes #LinkedIn Post erhöht meine #FSFE Spende auf bis zu 4000 Euro - sprich 10% der gesammten Film Produktionkosten
This #OpenSource#FlipperZero alternative is looking like a great new tool to tinker with. It's using a #HackBat hat on a #RaspberryPi, it's cheaper, and the source code is available. Anyone on #Fedi make one yet?
#Shaarli: WPCode keeps reappearing as a malware after deleting | WordPress.org - Options à insérer dans le fichier wp-config (racine d'une installation de WordPress) pour empêcher la modification des fichiers via l'éditeur interne et désactiver l'ajout d'extensions.
Ich hoffe, das Passkeys diesbezüglich nicht betroffen ist so wie Passwort-Manager wie @keepassxc, @bitwarden inklusive 2FA schon einen grösseren Schutz gegenüber der KI ergibt.
»GPT-4 kann eigenständig bekannte Sicherheitslücken ausnutzen:
Forscher haben festgestellt, dass GPT-4 allein anhand der zugehörigen Schwachstellenbeschreibungen 13 von 15 Sicherheitslücken erfolgreich ausnutzen kann.«
With my case of ADHD, my brain will easily shove a notification to the background if I don't expect it or if the notification sound is happening too often. My threshold for "too often" is very low.
So, I use alarms sparingly. They break through my ADHD, and this is a #hack I use to set future alarms and it's pretty simple:
Have a timely event that must happen more than 24 hours from now
Running the game Doom on the tiny color display of an commercial electric toothbrush.
The Toothbrush contains an ESP32-C3 microcontroller (4MB Flash). With the codebase from Spritetm and miniwad data file, you are able to get the complete size of DOOM and WAD file down to the 4MB of the ESP32.
As if they don't have enough problems, MediaWorks is investigating the possible hacking of data belonging to 2.461 million NZ citizens. That's half the country!
The data being sold on the dark web came from website competition entries. The hacker boasts that he has names, home addresses, mobile numbers, email addresses, dates of birth, home phone numbers, user postal codes, user genders and user IDs for almost two and a half million kiwis.