Posts
2586
Following
627
Followers
1397
"I'm interested in all kinds of astronomy."
repeated
repeated

The CCC 38 Saal1 Presentation - BlinkenCity: Radio-Controlling Street Lamps and Power Plants by Fabian Bräunlein and Luca Melette

...on reversing streetlamps, ripple controls, Versacom and Semagyr, power gear, smart meters, controlling FREs with flashlights and flipper zero's(!), was a tour de force in reverse engineering, critical infrastructure risk analysis, and hacking excellence. If you use electricity or streets, you should watch it.

https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/HSNZGR/

2
4
0
I just realized that in Die Hard 4 Matt's little "my dad is my hero" monologue to get the stolen car started is basically how prompt injection works these days :O
1
0
1
repeated

Cartoon Network website officially shuts down after 32 years 💔🥹😩😩😩😩😩

1
3
1
repeated

To use the Montreal subway, you tap a paper ticket against the turnstile and it opens. But how does it work? And how can the ticket be so cheap that it's disposable? I opened up the tiny NFC chip inside to find out more... 1/15

3
27
0
repeated

This year, we worked swiftly to save legacy media sites like https://Vice.com and MTVNews before decades worth of valuable journalism could be erased. These sites are searchable on the Wayback Machine. 📰📺

Help us in saving these resources: https://archive.org/donate/?origin=mstdn-eoy2024

1
9
0
Die Hard 4 is underrated. Fight me!
2
0
2
repeated
repeated

VulnCheck: Four-Faith Industrial Router CVE-2024-12856 Exploited in the Wild
CVE-2024-12856 (7.2 high) Four-Faith Industrial Router post-auth command injection is a reported exploited zero-day. Suricata rule available, no IOC though.

@todb there are still 2 more weekdays left in 2024, cram it all into the KEV!

1
2
0
repeated
Edited 3 months ago

After 6 months and about 333 commits I proudly present:

Faircamp 1.0 – A static site generator for audio producers
https://simonrepp.com/faircamp/

To recap the highlights of the past months and learn what's new in the final 1.0 release, check out the blog post: https://simonrepp.com/posts/faircamp-1.0/

Development of version 1.0 was made possible through the amazing support, funding and expertise of the @NGIZero programme and coalition, led by the @nlnet foundation and financed by the European Commission's @EC_NGI initiative – thank you so much for giving me and everyone benefitting from a better Faircamp this incredible opportunity!

Also, many thanks to all faircampers, contributors, testers, translators, bloggers, podcasters and encouraging voices for supporting this journey - for the final 1.0 release specifically to @branpos for release candidate testing, @n00q for bugreporting/testing, @limebar for the external artist page feature inspiration and @Vac for their diligent translation work.

Along with this release I've published multiple new documentation resources - from an official Linux/macOS/Windows tutorial to a 1.0 migration guide, from an overhauled reference manual to a beginner's guide to publishing faircamp (or any!) static sites - check out the website and recent posts in the hashtag to discover them!

That's all!

10
25
0
repeated
repeated

Unsigned and unencrypted radio protocols control a large amount of street lamps and power plants, threatening European grid stability.

All you need is a large antenna, aka. putting a wire on a kite.

Check the research of Fabian and Luca in Saal 1 at 21:45 or at Spiegel (paywall).

https://www.spiegel.de/netzwelt/web/stromversorgung-koennten-hacker-blackouts-ueber-funk-ausloesen-a-53c29240-425b-4603-852e-5a1c0a1e5400

0
2
0
Proprietary silicon ICs and dubious marketing claims? Let's fight those with a microscope! #38c3

https://streaming.media.ccc.de/38c3/relive/492

Didn't expect this one to have a #synthdiy angle! 🤩
0
0
2
Edited 3 months ago
I would complain about #38c3 streaming issues but the very existence of the service is so impressive I'll just thank the Angels now: thank you!

(Edit: in case of problems, downloads still work)
0
1
12
To little surprise it seems that multiple #antivirus vendors have been ignoring COM hijacking as a self-defense bypass and LPE vector since at least 2018, when I first published about this technique (see my prev post).

At #38c3 guys from Neodyme demonstrated some more elegant exploits than my initial PoCs, nice work! My German is rusty but I think I'd have some comments about proposed solutions :)

ReLive will be available here:

https://streaming.media.ccc.de/38c3/relive/815
0
4
10
repeated

Does anybody have a tap for a keg of beer (10l, DIN 6647-1) with them? Maybe a top vent as well. We Cologne people have beer, but no way to get it out of the keg.

If you can help us out of our misery, that would be great. And you'll get beer! 🍻

0
3
0
repeated

At , who's around? :)

2
2
0
Show older