h4ck3d bit

Follow The White Rabbit and see behind the binary world .
Type: All
push_pin
·
thumb_up5thumb_downchat_bubble1
push_pin
·

Safety tip. Swap all your account setup emails for protonmail.com

thumb_up16thumb_downchat_bubble1
push_pin
·

Cybercrimes occur in the 7 OSI layers, but analysis, data collection and often the onset of these attacks occur in the early layers. For a detailed analysis of a network operating with the TCP/IP protocol stack, we must use all available and necessary tools to locate possible...See more

thumb_up5thumb_downchat_bubble10
·

This future is closer than many assume or imagine. China already uses this style of surveillance and monitoring of people through public cameras on the streets. The dream of every undemocratic country is total control and monitoring of its citizens, such as implementing the use of RFID (Radio Frequency Identification). We must use all means, legal or otherwise, to escape the system. When unjust laws oppress the people, disobedience is a duty.

thumb_up1thumb_downchat_bubble

Android Mobile OS Snooping By Samsung, Xiaomi, Huawei and Realme Handsets "We find that even when minimally configured and the handset is idle these vendor-customized Android variants transmit substantial amounts of information to the OS developer and also to third-parties...See more

thumb_up1thumb_downchat_bubble
·
thumb_up2thumb_downchat_bubble
·

username: admin password: 123456

thumb_up2thumb_downchat_bubble

A nice tool for sharing/receiving files, hosting a static website, and anonymous chatting; all based on the Tor network. https://onionshare.org/ (Currently no mobile app, though can be accessed through the Tor browser.)

thumb_up2thumb_downchat_bubble
Follow The White Rabbit and see behind the binary world .