NEW? Check the /sec/ Career FAQ and Cybersecurity basics links above. Learn to code, learn computer basics, learn networking THEN work on hacking. It's technical and hard, but fun. Want to hack now? Try Webgoat and use the cheats. Grab Penetration Testing A Hands On Introduction and see what you don't know enough about. Always use a virtual machine for reading PDFs. Wanna be a punk? Read the What is cyberpunk? and start today!
If that dumbass with the "todo" list shows back up, get rid of the section on cybergoths. Everyone figured out they're just ravers with a latex fetish.
Parker Lee
>news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html >mid 2010s >A major concern was that Russian spies with physical proximity to sensitive U.S. buildings might be exfiltrating pilfered data that had “jumped the air gap,” >One factor behind U.S. intelligence officials’ fears was simple: The CIA had already figured out how to perform similar operations themselves, according to a former senior CIA officer directly familiar with the matter. “We felt it was pretty revolutionary stuff at the time,” What are they talking about?
Logan Parker
So the cia can do that to us??
Connor King
All computer parts radiate sound or energy, from hard drives to keyboards to screens. In a controlled environment they could get information from that. So they had to assume their enemy was way ahead of them in that field. Because if something is theoretically possible, it might as well exist.
Jason Gray
To add. It is currently popular to copy wifi signals and hope devices automatically connect to your spy device. And internet or connect to systems through that.
Thomas Diaz
Your second post is right but your first is literally conspiracy bullshit, its technically possible but there is no way for it to happen IRL
Leo Young
I dont believe its practical. But its the job of security experts to take every theoretical risk into account. And decide if its an acceptable threat or not.
Owen Collins
Well, yeah, but comsec/pemin is a rather old and well-tended field, and to the best of my knowledge there was simply no place for even a minor breakthrough in related maths or physics in '10s. Eh, it's probably nothing.
Jaxson King
>If that dumbass with the "todo" list shows back up, I am here in most threads. >get rid of the section on cybergoths. Why? The FAQ is about questions people may have. >Everyone figured out they're just ravers with a latex fetish. Well, why complain? It is not as if latex is alien to tech, pic. related.
Easily. After all, they can always rely on government mandated backdoors. All telecom infrastructure has to comply with requirement for providing means for tapping communications. And the capacity is huge.
Christian Wood
Is pentesterlab.com/bootcamp a good resource for beginners or is it a meme? I'm not going to pay for it, so don't worry.
Henry Edwards
Interesting to see the US admits being able to exfiltrate across an air gap. I really, really wonder how they do that. Bad BIOS?
Jaxson Turner
>literally conspiracy bullshit
You are gay.
James Ross
>Well, why complain? Because it has nothing to do with computers and that was resolved weeks ago.
Charles Long
>computers That is a rather narrow view of what Cyberpunk is. Nootropics, just to take one example, does not have much to do with computers either.
no problem, other mod is "Claire Bicker Mod" from nexus
also reposting this so I contributed some more than just bitching about trash ftp protocols in 2019 (don't use them, they can be MITM intercepted by the NSA Quantum Insert project)
>SMS/Email 2FA Worthless. >Authenticator 2FA Better. You can still get fucked by keyloggers or being phished. >U2F The best
Christian Turner
>java
Camden Morris
>runs out of arguments >shits on implementation classic Jow Forums
Landon Ortiz
On Android (yes I know inherently botnet, etc), what's the preferable way to block ads? >adguard dns >dns66 app >personaldnsfilter app
Jayden Ortiz
yea why pay for something ever.
fuck you
Brandon Jackson
uninstall and install a real os
James Wright
Java's fine as long as you don't shit out your code like you couldn't care less about your work. Telcos use Java Card (I think JCOP) for their SIMs.
Easton Harris
It depends, I'd say it's better than nothing in any case. Are you being specifically targeted by a dedicated attacker because you have access to something super high value, or are you a nobody trying to protect some essentially worthless account? For the latter I'd say it can be quite good, accounts can easily be compromised via leaks from incompetent companies and this can mean that random nobodies from across the world can get to your account. It would be much more difficult for them to simultaneously get to your phone as well, or even to your e-mail account as long as you don't use the same password. If you're actually trying to protect something that might make you specifically a target of somebody very dedicated to getting in, then yeah shit like SMS or e-mail 2FA isn't that great.
Ian Rogers
Root: AdAway No Root: NetGuard with Steven Black hosts
Nathan Bell
>as you don't shit out your code like you couldn't care less about your work.
this
the only people who complain about java are limp wristed faggots who use languages with lax syntax (python ruby etc)