Forwarded from Tech Crimes (Tailen)
Infosec Exchange
Mathias Payer (@gannimo@infosec.exchange)
Attached: 1 image
As it turns out, Volkswagen has been collecting extensive geo data from all their electric cars and made them available online in an AWS bucket. Almost 10TB of geo traces from 15 MiO cars. Amazing detail and patterns. This is why I don't…
As it turns out, Volkswagen has been collecting extensive geo data from all their electric cars and made them available online in an AWS bucket. Almost 10TB of geo traces from 15 MiO cars. Amazing detail and patterns. This is why I don't…
🔥4
#DeepSeek
I wonder what exactly happened and/or is happening there🤔
https://status.deepseek.com/incidents/666k4t024szr
I wonder what exactly happened and/or is happening there
Due to large-scale malicious attacks on DeepSeek's services, we are temporarily limiting registrations to ensure continued service. Existing users can log in as usual. Thanks for your understanding and support.
https://status.deepseek.com/incidents/666k4t024szr
Please open Telegram to view this post
VIEW IN TELEGRAM
👨💻2👀2
Forwarded from Unseelie Season 🇺🇦
This media is not supported in your browser
VIEW IN TELEGRAM
👏4🌚1🙈1
#security #Bluetooth #hack by #Apple #AirTag
An interesting topic on turning any Bluetooth device into an Apple AirTag tracker. Researchers have come up with a method that allows attackers to take the Bluetooth signal of any device, calculate a possible private key from the FindMy system, transmit it to Apple's FindMy servers, and then get the location of that unit.
https://nroottag.github.io/
An interesting topic on turning any Bluetooth device into an Apple AirTag tracker. Researchers have come up with a method that allows attackers to take the Bluetooth signal of any device, calculate a possible private key from the FindMy system, transmit it to Apple's FindMy servers, and then get the location of that unit.
https://nroottag.github.io/
nroottag.github.io
nRootTag - Tracking You from a Thousand Miles Away!
Research on how Apple's Find My network can be exploited to track non-Apple devices
🤯3🔥2🤔2