QuoteSep 23, 2024 
Quantum computers use the principles of quantum mechanics to process information in ways that classical computers can't. They rely on qubits, which can exist in multiple states simultaneously, allowing for more complex computations and parallel processing. Unlike classical bits, which are either 0 or 1, qubits can be in a state of 0, 1, or both simultaneously (superposition). This allows quantum computers to process a vast amount of information at once. Qubits can be entangled, meaning the state of one qubit can depend on the state of another, no matter how far apart they are. This correlation can be used to perform complex calculations more efficiently. Quantum computers could break widely used encryption methods (like RSA) due to their ability to factor large numbers quickly. This has led to the development of quantum-resistant encryption algorithms. They can simulate molecular interactions at a quantum level, significantly speeding up the drug discovery process by predicting how different compounds will behave. In this video, we have explained quantum computing in simple words and explained how quantum computers work.





Quote
Sep 21, 2024

QuoteA massive thank you to Alexandre De Oliveira and Karsten Nohl making this demo possible.

A special thanks to Crofton Black at Lighthouse Reports, Cathal Mc Daid at Enea, and James Hobson at Hacksmith Industries.

00:00 I hacked Linus!
00:59 How Steve Jobs and Steve Wozniak hacked the telephone network
02:22 Early history of the telephone
07:08 The kidnapping of Sheikha Latifa
08:41 How Signalling System No. 7 works
11:03 Why SS7 is vulnerable to hacking
12:15 How hackers gain access to phones
16:17 How I was able to spy on Linus' phone
18:09 How hackers can intercept text messages
21:04 How your location can be tracked via SS7
29:03 How to protect your phone from hacking






Wait, what happened? Why was the original thread deleted?

@Guybrush do you happen to know anything about this?

"stressed" is just "desserts" spelled backwards

Quote from: Lexi Darling on Sep 24, 2024, 01:46 PMWait, what happened? Why was the original thread deleted?

@Guybrush do you happen to know anything about this?
a week ago, I went through every single one of my posts on here and deleted things I didnt want on here


a few threads too

but just figured to start this great thread over


Quote from: Shhon on Sep 24, 2024, 03:20 PMa week ago, I went through every single one of my posts on here and deleted things I didnt want on here


a few threads too

but just figured to start this great thread over

Hmm, I completely understand, though it's a bummer to lose all my posts in those threads without any warning. Thank you for clarifying.

"stressed" is just "desserts" spelled backwards

Quote from: Lexi Darling on Sep 24, 2024, 03:22 PMHmm, I completely understand, though it's a bummer to lose all my posts in those threads without any warning. Thank you for clarifying.

I actually didnt even think about how that would adjust other members post counts :/

Sorry about that, but yeah I had some things on here I wanted off the internet and some things were quoted and I couldnt remove  :'(


Quote from: Shhon on Sep 24, 2024, 04:05 PMI actually didnt even think about how that would adjust other members post counts :/

Sorry about that, but yeah I had some things on here I wanted off the internet and some things were quoted and I couldnt remove  :'(

Oh no wonder I couldn't find this thread. I was wondering what happened and went looking but couldn't find it.

I was this cool the whole time.

I really enjoy these AI generated videos by Doopido 😄 kind of a surreal 90s atmosphere, I think 👌


There's a few more like it on the channel.

Happiness is a warm manatee

QuoteOct 16, 2024


Join General Paul M. Nakasone, U.S. Army (Retired), for a deep dive into the realities of modern cyber warfare at DefCon. With critical stories from his extensive career, General Nakasone will expose the details of national security in the digital era.

The longest-serving leader of both the National Security Agency and U.S. Cyber Command, General Nakasone has been on the frontlines of America's cyber defense. He will share firsthand accounts of defending against nation-state hackers, securing critical infrastructure during global crises, and the strategies that kept adversaries at bay.

This talk will examine the evolving nature of conflict, where the battlefield extends into cyberspace and unique partnerships must be built to offer agility and resilience. General Nakasone will discuss the persistent threats posed by sophisticated hackers and the innovative defenses employed to counteract them. He'll delve into the importance of intelligence sharing, international alliances, and transparency in operations.

Looking ahead, General Nakasone will present a forward-thinking vision for the future of warfare. He'll highlight the necessity for adaptive cyber strategies, resilient defenses, and the cultivation of new leadership to address emerging threats.



Quote

Oct 16, 2024



In 2018, a secure communications app called Anom started to gain popularity among organized criminals. Soon, top tier drug traffickers were using it all over the world. Because they thought their messages were secure, smugglers and hitmen coordinated high stakes crimes across the platform. But Anom had a secret: it was secretly run by the FBI.

For years Joseph Cox has investigated the inside story of Anom, speaking to people who coded the app, those who sold it, criminals who chatted across it, and the FBI agents who surreptitiously managed it. This new talk, building on details from his recent book DARK WIRE, will include never-before-published technical details on how the Anom network functioned, how the backdoor itself worked, and how Anom grew to such a size that the FBI started to lose control of its own creation.

It will also reflect on how police have entered a new phase of compromising entire encrypted phone networks, with little to no debate from the public, and provide critical insight on what really happens when authorities introduce a backdoor into a telecommunications product.

QuoteOct 16, 2024

Dapps (decentralized applications) are a type of application in the blockchain space that integrate both Web2 and blockchain components, presenting unique security challenges. Drawing from years of experience hacking Dapps, this session will share real-world examples of Dapp vulnerabilities and attack vectors. Topics covered include an introduction to Dapps, Dapp threat modeling, and Dapp vulnerability case studies, providing valuable insights and resources for newcomers and seasoned Web2 pentesters looking to enhance their Web3 application hacking skills.




QuoteTask & Purpose
Oct 18, 2024

I think One of the most tangible examples of economic cooperation between them was the Eilat-Ashkelon Pipeline Company (EAPC), which was an oil pipeline constructed in the 1960s to transport Iranian oil to Israel. They were originally 50/50 partners on the venture. One of the reasons the pipeline was built was to bypass Egypt's control of the Suez Canal after it was closed to Israeli shipping during the Arab-Israeli conflicts. That means the pipeline allowed oil to flow from Iran through the Red Sea to Israel, where it could then be refined and shipped to Europe.

Written by: Chris Cappy & Isaac Saypharath
Edited by: Syed

Or look at this declassified and sanitized CIA document that my handler gave to me, I mean that I found in my research, this document reveals how closely Israeli and Iranian intelligence had worked together in the 1960s and even in the 1980's. Here's a quote from the CIA document: "Israel regularly sold armaments to IRan during the Shah's reign mainly small arms mortars and ammunition provided engine overhaul and maintenance support for Iran's air force an army and extended technical support to IRan's infant defense industry" redacted section. Then it says "the arms sale gave a significant boost to Israel's fledgling defense industries and barter arrangements secured much needed oil in return for arms and technical assistance" end quote. So The CIA facilitated this friendship to the degree that they could because it worked to balance against the soviets.

Much of geopolitics involves hidden motivations and alliances that we often do not learn about until many years later.
Lets make no mistake, Iran and Israel were not very public about the depth of their relationship. This was a closested friendship because of a number of reasons not least of which the potential backlash from other Muslim-majority nations if they found out about this. But behind the scenes, they worked closely together. Here's how this frinemie type situation worked. So Iran supplied Israel with oil, and in return, Israel provided military aid. This unlikely alliance was built on mutual security concerns. Classic, You scratch my back I'll tickle your fickle arrangement.



I bought a new pen today so I've been checking out videos on TWSBI ECO fountain pens. From the research they seem to be about the best value as a first fountain pen (that I'll be using for sketching mainly).





QuoteOct 18, 2024
Flipper Zero is a pocketable electronic multitool. It can read and emulate RFID and NFC tags. It can copy wireless remote control signals. It can send infrared commands. And the GPIO ports can be used for electronic projects or to expand the functionality of Flipper Zero to completely new levels. All while being a cute little tamagotchi-like dolphin.


0:00 Intro
1:11 What is GPIO?
2:39 Do you need a custom firmware?
4:43 SubGHz CC1101
6:35 Rabbit-labs Flux Capacitor
7:44 Infrared
9:37 WiFi Development Board
10:29 Installing Marauder firmware with ESP Flasher
12:04 AWOK Dual Mini v2
13:06 Video Game Module
14:10 Outro