Forwarded from Tech Crimes (Tailen)
Infosec Exchange
Mathias Payer (@gannimo@infosec.exchange)
Attached: 1 image
As it turns out, Volkswagen has been collecting extensive geo data from all their electric cars and made them available online in an AWS bucket. Almost 10TB of geo traces from 15 MiO cars. Amazing detail and patterns. This is why I don't…
As it turns out, Volkswagen has been collecting extensive geo data from all their electric cars and made them available online in an AWS bucket. Almost 10TB of geo traces from 15 MiO cars. Amazing detail and patterns. This is why I don't…
🔥4
#DeepSeek
I wonder what exactly happened and/or is happening there🤔
https://status.deepseek.com/incidents/666k4t024szr
I wonder what exactly happened and/or is happening there
Due to large-scale malicious attacks on DeepSeek's services, we are temporarily limiting registrations to ensure continued service. Existing users can log in as usual. Thanks for your understanding and support.
https://status.deepseek.com/incidents/666k4t024szr
Please open Telegram to view this post
VIEW IN TELEGRAM
👨💻2👀2
Forwarded from Unseelie Season 🇺🇦
This media is not supported in your browser
VIEW IN TELEGRAM
👏4🌚1🙈1
#security #Bluetooth #hack by #Apple #AirTag
An interesting topic on turning any Bluetooth device into an Apple AirTag tracker. Researchers have come up with a method that allows attackers to take the Bluetooth signal of any device, calculate a possible private key from the FindMy system, transmit it to Apple's FindMy servers, and then get the location of that unit.
https://nroottag.github.io/
An interesting topic on turning any Bluetooth device into an Apple AirTag tracker. Researchers have come up with a method that allows attackers to take the Bluetooth signal of any device, calculate a possible private key from the FindMy system, transmit it to Apple's FindMy servers, and then get the location of that unit.
https://nroottag.github.io/
nroottag.github.io
nRootTag - Tracking You from a Thousand Miles Away!
Research on how Apple's Find My network can be exploited to track non-Apple devices
🤯3🔥2🤔2
#testing
#Playwright 1.51 is here!
✅ Copy Prompt for Debugging with AI
🪪 Git Info in HTML Reports
🔥 Firebase Authentication Support
👁️ Match Only Visible Locators
🪜 Test Step Improvements
📷 ARIA Snapshot Updates
🎥 Watch the video to see these features in action! 👇
https://youtu.be/-xWHilObrS0
#Playwright 1.51 is here!
✅ Copy Prompt for Debugging with AI
🪪 Git Info in HTML Reports
🔥 Firebase Authentication Support
👁️ Match Only Visible Locators
🪜 Test Step Improvements
📷 ARIA Snapshot Updates
🎥 Watch the video to see these features in action! 👇
https://youtu.be/-xWHilObrS0
YouTube
Playwright 1.51 Release Video - What's New! 🚀 copy prompt, git info, firebase auth, test steps
🚀 Playwright 1.51 is here with powerful new features to make debugging, reporting, and testing even smoother! From an AI-friendly Copy Prompt for quick error resolution to Git info in HTML reports, this update brings major enhancements. We’re also adding…
❤2👏1