as you know, the key to hacking the WPA2-PSK is to capture the PSK (pre-shared key or password) as it passes through the air in the 4-way handshake between the client and the AP (you must be in monitor mode to do so). this requires that we either wait for a client to connect to the AP or if a client has already connected, then we bump the client off (de-authenticate) the AP and wait for them to re-connect.
Facebook Accused of Spying on Instagram Users - Via Phone Cameras. The lawsuit came after an Apple iOS 14 privacy feature showed that Instagram was apparently activating iPhone cameras and microphones even when they weren’t in use. https://sputniknews.com/amp/science/202009181080507634-photo-facebook-accused-of-spying-on-instagram-users-via-phone-cameras/
attackers are trying to exploit a high-severity zeroday in cisco gear #cybersecurity
Hacked Facebook Again! Unauthenticated RCE on MobileIron MDM (slides inside) https://blog.orange.tw/2020/09/how-i-hacked-facebook-again-mobileiron-mdm-rce.html?m=1
#Security researchers still face legal action for “hacking” when reporting the bugs they find - as is the case with a #flaw recently reported to the Giggle social network.
Help me understand #mastodon better:
I know that the specific instance I'm signed up too doesn't matter too much. Still, the instances have specific rules, and thus different content.
That means that, inevitably, I'll be signed up on multiple instances, each on their own domain.
How do you guys manage this? Do you have a primary account, and then secondary accounts for specific interests?