Advertisement · 728 × 90

Posts by

Telefoncek.si • Rootkits - how deep the rabbit hole is? Rootkits are malicious software designed to gain unauthorized access to a computer system and hide their presence. Therefore attackers can use rootkits to co...

Rootkits - how deep the rabbit hole is?

telefoncek.si/2025/12/2025...

My article about rootkits... and how to mitigate the danger.

4 months ago 0 0 0 0
Preview
Signal Desktop on Linux no longer uses the app icon · Issue #7515 · signalapp/Signal-Desktop Using a supported version? I have searched searched open and closed issues for duplicates. I am using Signal-Desktop as provided by the Signal team, not a 3rd-party package. Overall summary As of t...

Are you even looking for a bug reports or not: github.com/signalapp/Si...

6 months ago 0 0 0 0

Ja, samo Titan M2 je šel skozi zelo resno testiranje, tudi pen testing, verifikacijo, audit in na koncu še certifikacijo. 3 leta. Upam, da je kaj primerljivega na trgu...

7 months ago 0 0 0 0

Any more info on official GrapheneOS phone? Will it have Titan M2 chip, hw attestation, etc.?

7 months ago 0 0 0 0
Telefoncek.si • How I discovered a hidden microphone on a Chinese NanoKVM NanoKVM is a hardware KVM switch developed by the Chinese company Sipeed. Released last year, it enables remote control of a computer or server using a virtu...

True, but what are Google, Apple and Facebook doing? Apple even admitted they listened to nearby conversations of their users!
Also, check this - my story on how I discovered a hidden microphone on Chinese NanoKVM device: telefoncek.si/2025/02/2025...

1 year ago 1 0 0 0
Telefoncek.si • How I discovered a hidden microphone on a Chinese NanoKVM NanoKVM is a hardware KVM switch developed by the Chinese company Sipeed. Released last year, it enables remote control of a computer or server using a virtu...

How I discovered a hidden microphone on a Chinese NanoKVM: telefoncek.si/2025/02/2025...

1 year ago 1 0 0 0
Telefoncek.si • Kako sem na mini kitajski napravi odkril skriti mikrofon Lansko leto je kitajsko podjetje Sipeed izdalo zanimivo napravico za oddaljeno upravljanje računalnikov in strežnikov, ki sliši na ime NanoKVM. Gre za tim. K...

How I found a hidden microphone on a small Chinese device (NanoKVM), and what can you do about it: telefoncek.si/2025/02/2025...

In Slovenian language, but Googls translate works fine.

1 year ago 0 0 0 0

From 2006 PDF files can contain JavaScript code to make PDFs more interactive and advanced.
Now someone included Linux operating system into PDF, so you can actually run a Linux from PDF file!
You can give it a try here: linux.doompdf.dev/linux.pdf
P. S. It is running terminal only, no GUI (...yet?)

1 year ago 0 0 0 0
Advertisement
AI, procesorji in druga visoka tehnologija kot orodje geopolitike Prispevek je zgolj in izključno moje osebno razmišljanje.

Razmišljanje o DeepSeek, OpenAI in geopolitiki visoke tehnologije: medium.com/@matej.kovac...

1 year ago 0 0 0 0

Not surprised. Check my presentation of malware hiding: telefoncek.si/predavanja/R...

1 year ago 0 0 0 0

Sorry, but this was a scam. They never delivered.

1 year ago 1 0 1 0

Yesterday I had a presentation on computer rootkits. I presented user and kernel mode rootkits, but also rootkits that operate at the hypervisor level, that target SMM and BIOS/UEFI firmware, and rootkits that can hide directly in CPU and various hardware components.
Presentation: shorturl.at/JUtqj

1 year ago 0 0 0 0
Preview
Knowing less about AI makes people more open to having it in their lives – new research People with less AI literacy often see the technology as ‘magical’ and awe-inspiring.

The ignorant are easier to rule:
theconversation.com/knowing-less...

1 year ago 0 0 0 0
Preview
CMA to investigate Apple and Google's mobile ecosystems Investigations will determine if Apple and Google have strategic market status in their mobile ecosystems, including operating systems, app stores and mobile browsers.

Have you seen this: www.gov.uk/government/n...

1 year ago 1 0 0 0
Cellular Security Florida Institute for Cybersecurity Research

Researchers discovered 119 vulnerabilities in LTE/5G core infrastructure.

Consequences: denial of cell service to an entire metropolitan area or city and... remotely compromise and access the cellular core.

Sounds fun.

Source:
cellularsecurity.org/ransacked

1 year ago 0 1 0 0
Advertisement

I wrote to and they answered: "Unfortunately, we do not officially support it or conduct any compatibility tests. ... I would request you to switch to a compatible device which is the only solution."

They are saying they do not conduct any compatibility tests. Is that true?

1 year ago 0 0 1 0