Discover
Communities
Decks
Login
Discover
Communities
Decks
Buy perks
Login
Signup
25
f1f1cin
F1F1cin
Available
Used
Resource Credits
25 Followers
1 Following
New York
https://twitter.com/F1F1cin
January 18, 2018
RSS feed
Blog
Blog
Posts
Comments
Communities
Wallet
Mute
f1f1cin
blockchain
6y
Breaking the Hyperledger - Part 1: Significance/Defense (Non-Technical)
Introduction and Defense of Significance The Hyperledger Project is a project of the Linux Foundation focusing on the application of blockchain technology at a global commercial scale that is currently
$ 0.000
1
3
f1f1cin
interlude
6y
We're All Mad Here
After running across $11 trillion in credit default swap securities, I gave up. Wanda, Cisco, Oracle, IBM... things are getting complicated. We're all criminals. Aren't we? I'm having trouble caring about
$ 0.000
1
1
f1f1cin
surveillance
6y
Data Exfiltration on a Mass Scale
As if we weren't already living in a dystopian non-fiction... The Idea Initial Thought Phone data exfiltration using receive-only SDRs. That's it. That's the thought that started it all. I was listening
$ 0.000
1
f1f1cin
defcon
6y
DEFCON China 2018 - The Rundown
The Disclaimers 1. I am a n00b. blehhhhhhhhh. I guess I was among the youngest people involved behind the scenes (possibly the youngest). 2. I have never been to DC Proper (Las Vegas), so I can't
$ 0.000
2
f1f1cin
ai
7y
Pill = (Robot > Human) ? Red : Blue;
News channels, Buzzfeed, unnecessarily long Twitter threads - they all provide a constant reminder on what values the general (American, for the purpose of this writing) population places on freedom of
$ 0.000
1
f1f1cin
aerospace
7y
Aerospace x Security: A Project of Human Augmentation
A conglomeration of senseless ideas that might eventually turn into something useful. Introduction There is a particular company that is becoming increasingly concerned with the intersection of the aerospace
$ 0.000
1
f1f1cin
technology
7y
Cyber Guerrilla
Note: I really dislike the word “cyber” but I’m not sure what else to use, so it will have to do. Something interesting has been popping
$ 0.000
1
2
f1f1cin
network
7y
The Misconception of Hacking (2)
After over a week-long break, here is the networks part of the series. Network-Based Hacking Network hacking usually involves a lot of probing and spoofing. Unlike malware-dependent hacking or social
$ 0.000
2
f1f1cin
hacking
7y
The Misconception of Hacking
People will call almost anything a hack when they don't have a more practical explanation. Kernel panic (BLUE SCREEN OF DEATH) when you had 100+ tabs open? Definitely a hack. Definitely not a memory error.
$ 0.000
2
f1f1cin
malware
7y
Thoughts on the Cyber Attack on the Winter Olympics:
Thoughts on the Attack on the Winter Olympics: The olympics winter games officials confirmed a cyber attack yesterday (Sunday Feb. 11). Normally, you would expect attacks to have some aim to gain, however,
$ 0.000
0
1
Follow, be first to know
Nothing found in blogs.
Center