Advertisement · 728 × 90

Posts by Tom Van de Wiele

Post image

Wanted to continue a project and Claude retroactively deleted the chats of a reverse engineering project I was last working on last month. That will teach me not to use cloud models with moving goal posts for security research & to stick to local models only...

2 weeks ago 1 0 0 0
Flightradar24 screenshot of a plane performing swimming-lane like passes

Flightradar24 screenshot of a plane performing swimming-lane like passes

Seems a LiDAR scan is in progress over Sjælland, Denmark. Probably to measure elevation for flood calculation if it is indeed the Danish Agency for Data Supply and Infrastructure. The LiDAR scans have an accuracy of 5-10 cm.

4 weeks ago 2 0 0 0

Let's see how long this stays up 😅

1 month ago 0 0 0 0

We found that Wi-Fi client isolation can often be bypassed. This allows an attacker who can connect to a network, either as a malicious insider or by connecting to a co-located open network, to attack others.

NDSS'26 paper: www.ndss-symposium.org/wp-content/u...
GitHub: github.com/vanhoefm/air...

1 month ago 16 8 3 0
Post image Post image

One of my favorite Web 1.0 sites is the “Silicon Zoo”.



Microscopic images of easter eggs hidden in CPUs. It’s way weirder than you’d expect. 



Sonic, the Space Shuttle...and a wedding invitation?

7 months ago 51 6 3 0
Preview
Fight Chat Control (@chatcontrol@mastodon.social) Attached: 1 image Danish Minister of Justice and chief architect of the current Chat Control proposal, Peter Hummelgaard: "We must break with the totally erroneous perception that it is everyone's c...

Danish Minister of Justice: "We must break with the totally erroneous perception that it is everyone's civil liberty to communicate on encrypted messaging services."

get rekt, fascist.

mastodon.social/@chatcontrol...

7 months ago 1 1 1 0
The Hacker Pager | exploitee.rs

Hacker chique LoRa pager, of course sold out already. But makes me want to make my own LoRa mesh chat device using meshtastic or a similar stack.
hackerpager.net

8 months ago 0 0 0 0
Preview
Why thousands of YouTube videos are about to lose money The big question for content creators: Will your videos still pay?

Wow, YouTube is actually doing the right thing here: gulfnews.com/technology/y...

9 months ago 67 11 9 2
Advertisement

@cyberdyne-t800.bsky.social

9 months ago 0 0 0 0

AI voices need to identify themselves as such, so the other party knows they are talking to a software robot. If we know we are talking to a robot, we absolutely do not need AI voices doing emotional vocalisations, or even worse: vocal fry or uptalk. Instant tab close and laptop slam.

9 months ago 1 0 0 0
WipEout (PSX) – Model Viewer

Reverse engineering Wipeout 2097 PSX models + animation = best 90s screensaver ever phoboslab.org/wipeout/

9 months ago 3 0 0 0
Post image

But luckily it does come with integration between Gemini & Google Drive. Which is great! Bc Google Drive doesn't even allow you to sort on file size + doesn't tell you the size of folders. AI to the rescue! NOT.

9 months ago 0 0 0 0

For those of you considering paying for @GoogleAI Gemini Pro to try out Veo2: you get 4 videos per day. By the time you figure out how prompts work you are done for today i.e. don't bother and find another service.

9 months ago 1 0 1 0

MS Teams Presence Logging for recon, social engineering and phishing campaign planning. Easily extendable with your own API or workflow to do pattern frequency analysis and find out when individuals or teams are e.g. in recurring meetings.

github.com/0xtosh/Teams...

9 months ago 0 0 0 0

FULLY anonymized
STRICTLY forbidden
HIGHLY sensitive
TOTALLY secure
FULLY compliant
PERFECTLY legal

If you want to find the path of least resistance when it comes to security, threat modeling and intrusion testing: follow the attack path with hyperbolic language that is trying to overcompensate.

10 months ago 0 0 0 0
Zero Days [ STUXNET worm documentary, 2016]
Zero Days [ STUXNET worm documentary, 2016] YouTube video by Andy Moore

With the on-going Internet and energy outages in Iran, I can only really think about the last 3 mins of the "Zero Days" documentary where the combined internal sources virtual person being interviewed stated that capabilities had already been deployed in Iran for 8+ years.
youtu.be/Fqk_VUMzY_M?...

10 months ago 5 2 0 0

Why does the network backbone of Telegram matter?

Because as @pwnallthethings.bsky.social was pointing out in 2022 (www.pwnallthethings.com/i/86455222/t...), Telegram's in-house TLS replacement provides a cleartext permanent device ID!

The network can follow users across WiFis, data plans, etc.

10 months ago 80 33 1 2
Post image

Don't do this

10 months ago 1 0 0 0
Advertisement
Post image

Rest in Peace, Bill Atkinson.

Hard to overstate the massive influence Bill's work had over me, and the way we all use computers today.

From his work on the Macintosh, to HyperCard, Bill was a pioneer of merging art & technology.

10 months ago 72 22 2 1
Post image

😂

10 months ago 0 0 0 0

My favorite glue-eating LLM is ChatGPT because it is so bad at coding, it just says "Yeah, you are right, I didn't finish that. Let me get you the full script and get back to you." where it just stops and does nothing 🙃

10 months ago 0 0 1 0

It seems that most the popular LLMs start going into infinite loops after a context of 2500 lines of code with heavy dependencies and then just... stop.

10 months ago 0 0 1 0

30 telecoms masts AND ~15 various electrical grid units have been sabotaged last months in south-east Sweden.

The sabotages are concentrated along highway E22, ie one of the main routes needed to reinforce Gotland in case of conflict. Ports are along this route, with the main one in the middle.

10 months ago 520 222 25 35
Post image

PHRACK special edition HaRDCov3R (#71.5) to be released at recon.cx (@reconmtl.bsky.social‬)

27th - 29th of June. Meet us at REcon.

Contains one 0day article from the upcoming 72 release, +unpublished 71 article, +classics and the Intro by REcon's own Hugo Fortier ❤️

10 months ago 19 6 1 0
GitHub - anton10xr/gibber-mcp: Tiny MCP server with cryptography tools, sufficient to establish end-to-end encryption between LLM agents Tiny MCP server with cryptography tools, sufficient to establish end-to-end encryption between LLM agents - anton10xr/gibber-mcp

Key exchange and encryption protocol for AI agents using gg-wave/Gibberlink: www.youtube.com/watch?v=m59y...

Source by Anton Pidkuiko based on ggwave library by Georgi Gerganov at github.com/anton10xr/gi...

10 months ago 0 0 0 0
Uit Humo, door Stephan Vanfleteren 2006

Uit Humo, door Stephan Vanfleteren 2006

I miss payphones.

10 months ago 2 0 0 0
Turning Portal 2 into a Web Server
Turning Portal 2 into a Web Server YouTube video by PortalRunner

Turning Portal 2 into a webserver. What.
www.youtube.com/watch?v=-v5v...

10 months ago 1 0 0 0

I have yet to see any details or examples, just headlines. Most tech including Chinese stuff comes with management interfaces exposed and with static passwords even. Where is the spy part.

11 months ago 3 0 0 0
Advertisement

If someone at AMD or Microsoft could solve the AMD fTPM stutter bug that would be great.

11 months ago 0 0 1 0

This was a fun trip down Internet memory lane
neal.fun/internet-art...

11 months ago 0 0 0 0