Settoletto 🍤@fed.dyne.orgM · 2 days ago"I Verified My LinkedIn Identity. Here's What I Actually Handed Over."plus-squarethelocalstack.euexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-link"I Verified My LinkedIn Identity. Here's What I Actually Handed Over."plus-squarethelocalstack.euSettoletto 🍤@fed.dyne.orgM · 2 days agomessage-square0linkfedilink
Settoletto 🍤@fed.dyne.orgM · 2 days agoLarge-scale online deanonymization with LLMsplus-squarearxiv.orgexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkLarge-scale online deanonymization with LLMsplus-squarearxiv.orgSettoletto 🍤@fed.dyne.orgM · 2 days agomessage-square0linkfedilink
Settoletto 🍤@fed.dyne.orgM · 5 days agoIDMerit data breach: 1 billion records of personal data exposed in KYC data leakplus-squarecybernews.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkIDMerit data breach: 1 billion records of personal data exposed in KYC data leakplus-squarecybernews.comSettoletto 🍤@fed.dyne.orgM · 5 days agomessage-square0linkfedilink
Dyne.org@fed.dyne.org · 5 months agoAge Verification for Humansplus-squarenews.dyne.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAge Verification for Humansplus-squarenews.dyne.orgDyne.org@fed.dyne.org · 5 months agomessage-square0linkfedilink
Settoletto 🍤@fed.dyne.orgM · 6 months agoAnatomy of a Billion-Download NPM Supply-Chain Attackplus-squarejdstaerk.substack.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAnatomy of a Billion-Download NPM Supply-Chain Attackplus-squarejdstaerk.substack.comSettoletto 🍤@fed.dyne.orgM · 6 months agomessage-square0linkfedilink
vortex@fed.dyne.orgEnglish · 6 months agoThe Fall of the Fiber Optic Control, Power and Paranoiaplus-squareescuderoandaluz.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Fall of the Fiber Optic Control, Power and Paranoiaplus-squareescuderoandaluz.comvortex@fed.dyne.orgEnglish · 6 months agomessage-square0linkfedilink
Jaromil@fed.dyne.orgM · 6 months agoMatrix admits 'high severity' flaws need breaking fixesplus-squarewww.theregister.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMatrix admits 'high severity' flaws need breaking fixesplus-squarewww.theregister.comJaromil@fed.dyne.orgM · 6 months agomessage-square0linkfedilink
vortex@fed.dyne.org · 6 months agosegfault - Making the world suck less one TCP packet at a time...plus-squarewww.thc.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linksegfault - Making the world suck less one TCP packet at a time...plus-squarewww.thc.orgvortex@fed.dyne.org · 6 months agomessage-square0linkfedilink
Jaromil@fed.dyne.orgM · 6 months agoHow We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositoriesplus-squareresearch.kudelskisecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositoriesplus-squareresearch.kudelskisecurity.comJaromil@fed.dyne.orgM · 6 months agomessage-square0linkfedilink
Jaromil@fed.dyne.orgM · 7 months ago"We are currently clean on OPSEC": The Signalgate Sagaplus-squaremicahflee.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link"We are currently clean on OPSEC": The Signalgate Sagaplus-squaremicahflee.comJaromil@fed.dyne.orgM · 7 months agomessage-square0linkfedilink
Jaromil@fed.dyne.orgM · 7 months agoRoot as Role: rethinking superuser accessplus-squarelechatp.github.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRoot as Role: rethinking superuser accessplus-squarelechatp.github.ioJaromil@fed.dyne.orgM · 7 months agomessage-square0linkfedilink
cm0002@lemmy.world · 8 months agoThe Solidity Language open-source package was used in a $500,000 crypto heistplus-squaresecurelist.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Solidity Language open-source package was used in a $500,000 crypto heistplus-squaresecurelist.comcm0002@lemmy.world · 8 months agomessage-square0linkfedilink
vortex@fed.dyne.org · 8 months agoEU AI 'minority report' predpol policy doesn't question AI fit for purpose in law enforcement, just concentrates on 'bias'.plus-squarewww.europol.europa.euexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEU AI 'minority report' predpol policy doesn't question AI fit for purpose in law enforcement, just concentrates on 'bias'.plus-squarewww.europol.europa.euvortex@fed.dyne.org · 8 months agomessage-square0linkfedilink
Jaromil@fed.dyne.orgM · 9 months agoHow I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementationplus-squaresean.heelan.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementationplus-squaresean.heelan.ioJaromil@fed.dyne.orgM · 9 months agomessage-square0linkfedilink
Settoletto 🍤@fed.dyne.orgM · 9 months agoU.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Dataplus-squaretheintercept.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkU.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Dataplus-squaretheintercept.comSettoletto 🍤@fed.dyne.orgM · 9 months agomessage-square0linkfedilink
Jaromil@fed.dyne.orgM · 9 months agoThe Quantum Enigma of Cybersecurity: Imminent Apocalypse or Distant Future?plus-squarenews.dyne.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Quantum Enigma of Cybersecurity: Imminent Apocalypse or Distant Future?plus-squarenews.dyne.orgJaromil@fed.dyne.orgM · 9 months agomessage-square0linkfedilink
Jaromil@fed.dyne.orgM · 10 months agoThe Signal Clone the Trump Admin Uses Was Hackedplus-squarewww.404media.coexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Signal Clone the Trump Admin Uses Was Hackedplus-squarewww.404media.coJaromil@fed.dyne.orgM · 10 months agomessage-square0linkfedilink
Jaromil@fed.dyne.orgM · 10 months agoWhen usability is deemed as more important than security...plus-squarearstechnica.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhen usability is deemed as more important than security...plus-squarearstechnica.comJaromil@fed.dyne.orgM · 10 months agomessage-square0linkfedilink
Jaromil@fed.dyne.orgM · 10 months agoHow to: Get to Know iPhone Privacy and Security Settingsplus-squaressd.eff.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to: Get to Know iPhone Privacy and Security Settingsplus-squaressd.eff.orgJaromil@fed.dyne.orgM · 10 months agomessage-square0linkfedilink
Jaromil@fed.dyne.orgM · 10 months agoHow to: Get to Know Android Privacy and Security Settingsplus-squaressd.eff.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to: Get to Know Android Privacy and Security Settingsplus-squaressd.eff.orgJaromil@fed.dyne.orgM · 10 months agomessage-square0linkfedilink