📱Weaknesses with fundamental security problems have been discovered in the super-duper protected messenger "Threema" — audit of researchers at the University of🇨🇭ETH Zurich
📱Weaknesses with fundamental security problems have been discovered in the super-duper protected messenger "Threema" — audit of researchers at the University of🇨🇭ETH Zurich
For OSINT practitioners, hashing can be an extremely valuable addition to their workflow, both as a verification tool and a documentation method
Analysis and forensics of emails... what to read?
##OSINT #Crypto Today we are analyzing with you the resources that I use when conducting OSINT research related to the analysis of cryptocurrency transactions.
Geolocation Spy (GeoSpy) is an OSINT analysis and research tool that is used to track and execute intelligent social engineering attacks in real time.
What is Zeronet?
• ZeroNet is a decentralized web platform that offers to use bitcoin targeting and verification mechanisms in combination with BitTorrent distributed delivery technologies to create sites that cannot be censored, interfered with or blocked.
OFDM method.
• OFDM is one of the methods of digital signal modulation that allows increasing the data transfer rate due to the reasonable use of communication channels and data transmission method. The main reason for the appearance and application of this signal processing method is the search for ways to combat broadband interference – the main reason for poor communication in conditions of a large number of large-sized obstacles in the form of multi-storey residential buildings and other buildings.
What is multiplexing?
Due to the fact that computer networks are used to transmit data over long distances, they tend to minimize the number of wires in the cable, in order to save money. Therefore, technologies have been developed that allow several data streams to be transmitted over the same communication channel at once
Cryptonite is a multifunctional cryptocurrency exchange software. Thanks to the support of several cryptocurrencies, you can place purchases and sales using direct bank transfer, credit cards or any other supported payment gateways.
The black parasite. We study the work of the Venom warrior
How to restrict server users' access to a specific directory in Linux