jet@hackertalks.comMEnglish · 10 hours agoGo Bags - What is in yours?plus-squarehackertalks.comimagemessage-square5fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1imageGo Bags - What is in yours?plus-squarehackertalks.comjet@hackertalks.comMEnglish · 10 hours agomessage-square5fedilink
jet@hackertalks.comMEnglish · 3 days agoclan.lol darknet frameworkplus-squaremessage-squaremessage-square2fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1message-squareclan.lol darknet frameworkplus-squarejet@hackertalks.comMEnglish · 3 days agomessage-square2fedilink
jet@hackertalks.comMEnglish · 10 days agoAttacking Samsung Galaxy A* Boot Chain, and Beyond - blackhatplus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAttacking Samsung Galaxy A* Boot Chain, and Beyond - blackhatplus-squareyoutu.bejet@hackertalks.comMEnglish · 10 days agomessage-square0fedilink
jet@hackertalks.comMEnglish · 17 days agoUnveiling Mac Security: A Comprehensive Exploration of Sandboxing and AppData TCC - 40mplus-squareyoutu.beexternal-linkmessage-square1fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkUnveiling Mac Security: A Comprehensive Exploration of Sandboxing and AppData TCC - 40mplus-squareyoutu.bejet@hackertalks.comMEnglish · 17 days agomessage-square1fedilink
jet@hackertalks.comMEnglish · edit-226 days agoSwipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps - Blackhat - 40mplus-squarewww.youtube.comexternal-linkmessage-square2fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkSwipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps - Blackhat - 40mplus-squarewww.youtube.comjet@hackertalks.comMEnglish · edit-226 days agomessage-square2fedilink
jet@hackertalks.comMEnglish · edit-22 months agoComparison of Payment Methodsplus-squareeylenburg.github.ioexternal-linkmessage-square2fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkComparison of Payment Methodsplus-squareeylenburg.github.iojet@hackertalks.comMEnglish · edit-22 months agomessage-square2fedilink
jet@hackertalks.comMEnglish · edit-22 months agoBackdooring Backdoors plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkBackdooring Backdoors plus-squareyoutu.bejet@hackertalks.comMEnglish · edit-22 months agomessage-square0fedilink
jet@hackertalks.comMEnglish · edit-22 months agoPaperback - Paper archive using Shamir's Secret Sharing of sensitive dataplus-squaregithub.comexternal-linkmessage-square1fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkPaperback - Paper archive using Shamir's Secret Sharing of sensitive dataplus-squaregithub.comjet@hackertalks.comMEnglish · edit-22 months agomessage-square1fedilink
jet@hackertalks.comMEnglish · 2 months agoFingerprint Hardware Security Keysplus-squarehackertalks.comimagemessage-square1fedilinkarrow-up111arrow-down10
arrow-up111arrow-down1imageFingerprint Hardware Security Keysplus-squarehackertalks.comjet@hackertalks.comMEnglish · 2 months agomessage-square1fedilink
jet@hackertalks.comMEnglish · edit-22 months agoBusKill - Deadman switch for laptopsplus-squareyoutu.beexternal-linkmessage-square1fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBusKill - Deadman switch for laptopsplus-squareyoutu.bejet@hackertalks.comMEnglish · edit-22 months agomessage-square1fedilink