donphan.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This generalist Mastodon server welcomes enthusiasts of the Pokémon franchise, to talk about it or anything else. Join the federation!

Server stats:

131
active users

#hacking

9 posts8 participants1 post today
Ciarán McNally<p>Here are my favourite 17 genders, some old and some new. I'm considering going through these books a second/third time over the next 1-3 years and maybe making a blog/git repo to explore some of the concepts and ideas a little more rigidly by combining similar chapters for example, modernizing and putting some of the practical knowledge in a single place grouped by topic with my own spin/tools on top etc <a href="https://mastodon.ie/tags/Blog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blog</span></a> <a href="https://mastodon.ie/tags/Ideas" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ideas</span></a> <a href="https://mastodon.ie/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a></p>
Y⃒̸̷̝̜̙ͥͥͥngmar<p>Daddy's got a new axe 🪓 </p><p><a href="https://social.tchncs.de/tags/Firewood" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewood</span></a> <a href="https://social.tchncs.de/tags/Homestead" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Homestead</span></a> <a href="https://social.tchncs.de/tags/Chopping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chopping</span></a> <a href="https://social.tchncs.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://social.tchncs.de/tags/Splitting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Splitting</span></a> <a href="https://social.tchncs.de/tags/Axe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Axe</span></a> <a href="https://social.tchncs.de/tags/Tools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tools</span></a></p>
Hackaday<p>You Know Pi, But Do You Really Know E?</p><p>Pi Day is here! We bet that you know that famous constant to a few decimal points, and you could probably explain what it really means: the ratio of a …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/03/14/you-know-pi-but-do-you-really-know-e/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/03/14/you-kn</span><span class="invisible">ow-pi-but-do-you-really-know-e/</span></a></p>
Madrid<h2>Interceptando llamadas deaplicaciones en android</h2> <p>CSOA La Enredadera de Tetuán, viernes, 14 de marzo, 17:30 CET</p><p>🪴Hacklab la raiz 🪴<br><a href="http://👾hacklab.laenre.net" rel="nofollow noopener noreferrer" target="_blank">👾hacklab.laenre.net</a> 👾<br>🍁 Cso la enredadera 🍁<br>📍 calle de la coruña n° 5 📍<br>🕒 17:30 - 20:30 🕘<br><br>El desglose :<br>17:30: instalación de herramientas quien haya tenido problemas + set up <br>18:00: inicio charla (puntual)<br>20:00: free hacking con lo aprendido<br><br>Temática:<br>- proxy ¿Qué es y por qué nos es útil?<br>- interceptar peticiones del navegador<br>- interceptar peticiones de app Android <br>- ssl pinning bypass<br><br>Tools: <br>Herramientas para el taller de android <br><a href="https://pad.riseup.net/p/r.4709a9cdad446c0d05eb562518540b4d" rel="nofollow noopener noreferrer" target="_blank">https://pad.riseup.net/p/r.4709a9cdad446c0d05eb562518540b4d</a></p> <p><a href="https://mad.convoca.la/event/interceptando-llamadas-deaplicaciones-en-android" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mad.convoca.la/event/intercept</span><span class="invisible">ando-llamadas-deaplicaciones-en-android</span></a></p>
Snowshadow 🇨🇦<p>Hacktivists protest Musk and Trump by shutting down X for tens of thousands</p><p>The self-proclaimed hacktivist group Dark Storm on Monday is claiming responsibility for an ongoing outage impacting X to protest the social media platform’s owner Elon Musk and US President Donald Trump. </p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Twitter</span></a> <a href="https://mastodon.social/tags/Musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Musk</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> </p><p><a href="https://cybernews.com/news/x-outage-hacktivist-dark-storm-protest-musk-and-trump-/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybernews.com/news/x-outage-ha</span><span class="invisible">cktivist-dark-storm-protest-musk-and-trump-/</span></a></p>
Snowshadow 🇨🇦<p>Multiple outages at X caused by ‘massive cyberattack,’ Musk claims</p><p>Scale of attack suggests role of a country or "coordinated group," Musk claimed.</p><p><a href="https://mastodon.social/tags/Musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Musk</span></a> <a href="https://mastodon.social/tags/Twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Twitter</span></a> <a href="https://mastodon.social/tags/Hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacker</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> </p><p><a href="https://abcnews.go.com/Business/multiple-outages-caused-massive-cyberattack-musk/story?id=119641433" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">abcnews.go.com/Business/multip</span><span class="invisible">le-outages-caused-massive-cyberattack-musk/story?id=119641433</span></a></p>
Maddler :sarcasm: :antifa:<p>It gets even better...<br><a href="https://mastodon.ie/tags/elonmusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>elonmusk</span></a> <a href="https://mastodon.ie/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.ie/tags/ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukraine</span></a></p>
Alberto Quian🏴‍☠️:hispagatos:<p>Ser o "teloneiro" de don Xosé Manuel Beiras dáme algo de vertixe. O 19 de marzo, en Vigo, o meu berce.</p><p><a href="https://hispagatos.space/tags/Vigo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vigo</span></a> <a href="https://hispagatos.space/tags/Galicia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Galicia</span></a> <a href="https://hispagatos.space/tags/EticaHacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EticaHacker</span></a> <a href="https://hispagatos.space/tags/CulturaHacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CulturaHacker</span></a> <a href="https://hispagatos.space/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://hispagatos.space/tags/Hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackers</span></a></p><p><a href="https://agora-r.ecoarglobal.org/xornadas-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">agora-r.ecoarglobal.org/xornad</span><span class="invisible">as-2025/</span></a></p>
Nils Wilcke<p>X en rade plusieurs fois aujourd’hui. Selon SpyoSecure, un site dédié aux cyberattaques, l'attaque aurait été revendiquée par le groupe de hackers Dark Storm Team. Il s'agirait d'une attaque en déni de service. C’est bien triste 🤷‍♂️ (second degré) Musk enrage de ses petits poings sur son réseau, d’autant que le cour de l’action Tesla s’effondre. Il n’y a pas de petits plaisirs https://<a href="https://www.bfmtv.com/tech/twitter/nous-sommes-attaques-tous-les-jours-les-pannes-sur-x-ont-ete-causees-par-une-cyberattaque-selon-elon-musk_AV-202503100703.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bfmtv.com/tech/twitter/nous-so</span><span class="invisible">mmes-attaques-tous-les-jours-les-pannes-sur-x-ont-ete-causees-par-une-cyberattaque-selon-elon-musk_AV-202503100703.html</span></a></p><p><a href="https://mastodon.social/tags/Politique" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Politique</span></a> <a href="https://mastodon.social/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a> <a href="https://mastodon.social/tags/Musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Musk</span></a> <a href="https://mastodon.social/tags/EtatsUnis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EtatsUnis</span></a> <a href="https://mastodon.social/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> <a href="https://mastodon.social/tags/Twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Twitter</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a></p>
Teno<p>Undocumented "backdoor" found in Bluetooth chip used by a billion devices</p><p><a href="https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/</span></a></p><p><a href="https://mas.to/tags/esp32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esp32</span></a> <a href="https://mas.to/tags/bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bluetooth</span></a> <a href="https://mas.to/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Geekland<p>Gigabyte: Cuando el C# se convirtió en arma (y herramienta de aprendizaje) <a href="https://mastodon.social/tags/c" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c</span></a># <a href="https://mastodon.social/tags/ciberseguridad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ciberseguridad</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/hacktivismo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacktivismo</span></a> <a href="https://mastodon.social/tags/maldev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maldev</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a><br><a href="https://www.hackplayers.com/2025/03/gigabyte-cuando-el-c-se-convirtio-en-arma.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hackplayers.com/2025/03/gigaby</span><span class="invisible">te-cuando-el-c-se-convirtio-en-arma.html</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>U.S. authorities have seized over $23 million in cryptocurrency linked to the theft of $150 million from a Ripple crypto wallet in January 2024. Investigators believe hackers who breached LastPass in 2022 were behind the attack. <a href="https://kolektiva.social/tags/Bitcoin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bitcoin</span></a> <a href="https://kolektiva.social/tags/Cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptocurrency</span></a> <a href="https://kolektiva.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://www.bleepingcomputer.com/news/security/us-seizes-23-million-in-crypto-stolen-via-password-manager-breach/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/us-seizes-23-million-in-crypto-stolen-via-password-manager-breach/</span></a></p>
Flipboard Tech Desk<p>The U.S. has charged 12 Chinese government-linked hackers who have been accused of hacking 100 American organizations, including the U.S. Treasury.</p><p><span class="h-card" translate="no"><a href="https://flipboard.com/@Techcrunch" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Techcrunch</span></a></span> reports:</p><p><a href="https://flip.it/WuhLaJ" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">flip.it/WuhLaJ</span><span class="invisible"></span></a></p><p><a href="https://flipboard.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://flipboard.social/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> <a href="https://flipboard.social/tags/USGovernment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USGovernment</span></a></p>
The Japan Times<p>The U.S. Justice Department has charged 10 Chinese citizens and two government agents for computer hacks that targeted dissidents, religious groups, news outlets and American government agencies. <a href="https://www.japantimes.co.jp/news/2025/03/06/world/crime-legal/us-china-hackers-critics-data/?utm_medium=Social&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">japantimes.co.jp/news/2025/03/</span><span class="invisible">06/world/crime-legal/us-china-hackers-critics-data/?utm_medium=Social&amp;utm_source=mastodon</span></a> <a href="https://mastodon.social/tags/worldnews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>worldnews</span></a> <a href="https://mastodon.social/tags/crimelegal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crimelegal</span></a> <a href="https://mastodon.social/tags/china" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>china</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/us" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>us</span></a> <a href="https://mastodon.social/tags/personalinformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>personalinformation</span></a></p>
Cosmic Librarian<p>Planes are having their GPS hacked. Could new clocks keep them safe?</p><p>Over the last three months of 2024, more than 800 cases of GPS interference were recorded in Lithuanian airspace. Estonia and Finland have also raised concerns, accusing Russia of deploying technology to jam satellite navigation signals near Nato's eastern flank – though the country has denied that. Last March the then Defence Secretary, Grant Shapps, was on a plane that had its GPS signal jammed while flying close to Russian territory.<br><a href="https://universeodon.com/tags/airplanes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>airplanes</span></a> <a href="https://universeodon.com/tags/GPS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPS</span></a> <a href="https://universeodon.com/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> <a href="https://universeodon.com/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p><p><a href="https://www.bbc.com/news/articles/cq6yg204pvmo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bbc.com/news/articles/cq6yg204</span><span class="invisible">pvmo</span></a></p>
Daan | New To Narrative<p>I've not been writing about <a href="https://peoplemaking.games/tags/gamedev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gamedev</span></a> as much in these past few weeks. This week, we're learning a little bit about <a href="https://peoplemaking.games/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> instead!</p><p><a href="https://newtonarrative.com/news/cybersec-101/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">newtonarrative.com/news/cybers</span><span class="invisible">ec-101/</span></a></p><p><a href="https://peoplemaking.games/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://peoplemaking.games/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://peoplemaking.games/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://peoplemaking.games/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
c't Magazin<p>heise+ | Webservices programmieren in Go: Daten prüfen und speichern, Passwörter hashen</p><p>Nie sollte ein Backend ungeprüft Daten von einem Client verarbeiten und speichern. Die Techniken dafür sind nicht schwierig zu erlernen.</p><p><a href="https://www.heise.de/hintergrund/Webservices-programmieren-in-Go-Daten-pruefen-und-speichern-Passwoerter-hashen-10278443.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/hintergrund/Webservic</span><span class="invisible">es-programmieren-in-Go-Daten-pruefen-und-speichern-Passwoerter-hashen-10278443.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Datenbanken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenbanken</span></a> <a href="https://social.heise.de/tags/GoogleGo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoogleGo</span></a> <a href="https://social.heise.de/tags/GoLang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoLang</span></a> <a href="https://social.heise.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://social.heise.de/tags/Programmierung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Programmierung</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Softwareentwicklung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Softwareentwicklung</span></a> <a href="https://social.heise.de/tags/SQL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SQL</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Alexandre Borges<p>Hacking the Xbox 360 Hypervisor: </p><p>01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: <a href="https://icode4.coffee/?p=1047" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1047</span><span class="invisible"></span></a></p><p>02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: <a href="https://icode4.coffee/?p=1081" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1081</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://mastodon.social/tags/xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xbox</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
Alexandre Borges<p>Hacking the Xbox 360 Hypervisor: </p><p>01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: <a href="https://icode4.coffee/?p=1047" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1047</span><span class="invisible"></span></a></p><p>02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: <a href="https://icode4.coffee/?p=1081" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1081</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xbox</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
Hackaday<p>Sensory Substitution Device Tingles Back Of Your Hand</p><p>A team from the University of Chicago brings us a new spin on sensory substitution, the “Seeing with the Hands” project, turning external environment input into sensations. Here specifically, the …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/03/03/sensory-substitution-device-tingles-back-of-your-hand/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/03/03/sensor</span><span class="invisible">y-substitution-device-tingles-back-of-your-hand/</span></a></p>