fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.8K
active users

#whitehat

0 posts0 participants0 posts today
techi<p>They broke the internet, hacked giants, and rewrote the rules of cybersecurity. Meet the 10 most notorious hackers who shaped the digital world for better or worse.</p><p><a href="https://mstdn.social/tags/Hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hackers</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/KevinMitnick" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KevinMitnick</span></a> <a href="https://mstdn.social/tags/Mafiaboy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mafiaboy</span></a> <a href="https://mstdn.social/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a> <a href="https://mstdn.social/tags/BlackHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat</span></a> <a href="https://mstdn.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://mstdn.social/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://mstdn.social/tags/HackingStories" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackingStories</span></a> <a href="https://mstdn.social/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://mstdn.social/tags/TECHi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TECHi</span></a> </p><p>Read Full Article Here :- <a href="http://techi.com/the-10-most-notorious-hackers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">http://</span><span class="ellipsis">techi.com/the-10-most-notoriou</span><span class="invisible">s-hackers/</span></a></p>
SciPunkIn the movie Hackers (1995), a group of nerds hack into computer networks to outsmart corrupt authorities and uncover a conspiracy. <br> <br> The film features a mix of retro computing aesthetics, cyberpunk themes, and real-life cybersecurity concepts like sudo and root access.<br> <br> <br> <br> <a href="https://pixelfed.social/discover/tags/hackers?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#hackers</a> <a href="https://pixelfed.social/discover/tags/retro?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#retro</a> <a href="https://pixelfed.social/discover/tags/computing?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#computing</a> <a href="https://pixelfed.social/discover/tags/cybersecurity?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cybersecurity</a> <a href="https://pixelfed.social/discover/tags/cyberpunk?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cyberpunk</a> <a href="https://pixelfed.social/discover/tags/movies?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#movies</a> <a href="https://pixelfed.social/discover/tags/sudo?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#sudo</a> <a href="https://pixelfed.social/discover/tags/root?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#root</a> <a href="https://pixelfed.social/discover/tags/god?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#god</a> <a href="https://pixelfed.social/discover/tags/cyberspace?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cyberspace</a> <a href="https://pixelfed.social/discover/tags/datasecurity?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#datasecurity</a> <a href="https://pixelfed.social/discover/tags/hacking?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#hacking</a> <a href="https://pixelfed.social/discover/tags/computers?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#computers</a> <a href="https://pixelfed.social/discover/tags/network?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#network</a> <a href="https://pixelfed.social/discover/tags/blackhat?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#blackhat</a> <a href="https://pixelfed.social/discover/tags/whitehat?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#whitehat</a> <a href="https://pixelfed.social/discover/tags/cyberpunkaesthetic?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cyberpunkaesthetic</a> <a href="https://pixelfed.social/discover/tags/computers?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#computers</a> <a href="https://pixelfed.social/discover/tags/filesystem?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#filesystem</a> <a href="https://pixelfed.social/discover/tags/fisherstevens?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#fisherstevens</a> <a href="https://pixelfed.social/discover/tags/pennjillette?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#pennjillette</a>
Script Kiddie<p><strong>The CyberSecurity Tarot</strong></p> <p><a href="https://anonsys.net/display/bf69967c-9568-6eb4-8da6-a50242899231" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">anonsys.net/display/bf69967c-9</span><span class="invisible">568-6eb4-8da6-a50242899231</span></a></p>
D_70WN 🌈 🏳️‍⚧️<p>The company was informed by me with a full report and the chance to clean things up, the copied data was deleted and the hard disk was physically destroyed completely by an appropriate service provider. 2/2</p><p><a href="https://chaos.social/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a> <a href="https://chaos.social/tags/digitalforensic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforensic</span></a></p>
Phillemon CEH | CTH<p>🎭💻 Think Like a Black Hat, Act Like a White Hat! </p><p>👁️‍🗨️ Let's Face-It ! -&gt; 🕵‍♂️ To Outsmart cybercriminals, you must think like one—but use your skills for defense, not destruction. Learn the mindset of hackers and the strategies ethical hackers use to strengthen cybersecurity. 🔍🔐</p><p>📖 Read more: <a href="https://wardenshield.com/think-like-a-black-hat-and-act-like-a-white-hat" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wardenshield.com/think-like-a-</span><span class="invisible">black-hat-and-act-like-a-white-hat</span></a></p><p><a href="https://mastodon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a> <a href="https://mastodon.social/tags/BlackHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat</span></a> <a href="https://mastodon.social/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://mastodon.social/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://mastodon.social/tags/WardenShield" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WardenShield</span></a> <a href="https://mastodon.social/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a></p>
Official Kakistocracy Jester 🪓<p>Mission for a <a href="https://stranger.social/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a> hacker: take over the controls of a SpaceX Falcon-9 or Falcon Heavy rocket, and land the boosters in Europe so they can reverse engineer the rockets and stop using SpaceX or Russia to launch their stuff.</p>
Alan Rycroft 🇨🇦<p>It would be interesting if the <a href="https://mastodon.world/tags/hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacker</span></a> <a href="https://mastodon.world/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a> communities targeted <a href="https://mastodon.world/tags/Tesla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tesla</span></a> <a href="https://mastodon.world/tags/SpaceX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SpaceX</span></a> and all Musk-controlled entities</p><p><a href="https://mastodon.world/tags/DictatorTrump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DictatorTrump</span></a> <a href="https://mastodon.world/tags/BoycottMusk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BoycottMusk</span></a></p>
developer.overheid.nl<p>Weekend-podcast-tip!</p><p>De nieuwste aflevering van De Technoloog met Chester van den Bogaard over ethisch hacken is zeer de moeite waard. 🎧💻</p><p>Onder andere de Advisories van onze collega's bij het NCSC kwamen langs—deze lijst met beveiligingsadviezen helpt organisaties kwetsbaarheden te dichten.</p><p>🎙️ Luister hier: <a href="https://open.spotify.com/episode/7gtGytv1JPu8ngDZ4Kj1L9?si=8jGv6JELTai-giWpdgUzUw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">open.spotify.com/episode/7gtGy</span><span class="invisible">tv1JPu8ngDZ4Kj1L9?si=8jGv6JELTai-giWpdgUzUw</span></a></p><p><a href="https://social.overheid.nl/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://social.overheid.nl/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a> <a href="https://social.overheid.nl/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://social.overheid.nl/tags/NCSC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NCSC</span></a> <a href="https://social.overheid.nl/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
DrPetz<p>In der Ferienunterkunft ist das Gästenetz nicht vom "Rest" getrennt. Ich kann mich auf den Wechselrichter der Solaranlage mit dem Default-Passwort einloggen und auf meinem Android wird mir die Steuerung des Gastgeber-TV-Gerätes in die Benachrichtigungen gelegt.<br>Die Gastgeber haben absolut keine Ahnung und nur begrenzt Interesse / Verständnis. </p><p>Was würdet ihr tun?</p><p><a href="https://troet.cafe/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a> <a href="https://troet.cafe/tags/keinSchaden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keinSchaden</span></a> <a href="https://troet.cafe/tags/NoHarm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoHarm</span></a></p>
Mosscap<p>I saw this posted on Xiaohongshu. Not all heroes wear capes. Some wear fursonas. <br><a href="https://pounced-on.me/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://pounced-on.me/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a> <a href="https://pounced-on.me/tags/whitehathacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehathacker</span></a> <a href="https://pounced-on.me/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://pounced-on.me/tags/furry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>furry</span></a> <a href="https://pounced-on.me/tags/hardening" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardening</span></a> <a href="https://pounced-on.me/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
SciPunkHackers (1995)<br> <br> <br> <br> <br> <a href="https://pixelfed.social/discover/tags/hackers?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#hackers</a> <a href="https://pixelfed.social/discover/tags/retrocomputing?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#retrocomputing</a> <a href="https://pixelfed.social/discover/tags/cybersecurity?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cybersecurity</a> <a href="https://pixelfed.social/discover/tags/cyberpunk?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cyberpunk</a> <a href="https://pixelfed.social/discover/tags/movies?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#movies</a> <a href="https://pixelfed.social/discover/tags/gifs?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#gifs</a> <a href="https://pixelfed.social/discover/tags/cyberspace?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#cyberspace</a> <a href="https://pixelfed.social/discover/tags/datasecurity?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#datasecurity</a> <a href="https://pixelfed.social/discover/tags/e?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#e</a>=mc2 <a href="https://pixelfed.social/discover/tags/blackhat?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#blackhat</a> <a href="https://pixelfed.social/discover/tags/whitehat?src=hash" class="u-url hashtag" rel="nofollow noopener" target="_blank">#whitehat</a>
Prof. Dr. Dennis-Kenji Kipker<p>1.000 Gründe für die dringend notwendige <a href="https://chaos.social/tags/Reform" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reform</span></a> vom <a href="https://chaos.social/tags/Computerstrafrecht" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Computerstrafrecht</span></a> - und seit heute wieder einer mehr: So wurde bekannt, dass der "<a href="https://chaos.social/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberangriff</span></a>" auf D-Trust vor Kurzem wohl ein <a href="https://chaos.social/tags/Whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whitehat</span></a> Sicherheitsforscher war, der über eine offene API auf die Daten zugegriffen hat. Aufgrund der rechtlichen Grauzone des "<a href="https://chaos.social/tags/Hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacker</span></a>-Paragraphen" und der von D-Trust erstatteten Strafanzeige habe er sich jedoch nicht an D-Trust, sondern unverzüglich an den <a href="https://chaos.social/tags/CCC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CCC</span></a> gewandt:</p><p><a href="https://www.heise.de/news/D-Trust-Hinter-Angriff-auf-Antragsportal-steckte-wohl-White-Hat-Hacker-10251620.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/D-Trust-Hinter-A</span><span class="invisible">ngriff-auf-Antragsportal-steckte-wohl-White-Hat-Hacker-10251620.html</span></a></p>
քʏʀǟȶɛɮɛǟʀɖ<p>have been thinking of buying a flipper zero for a while. the limited edition transparent version dropped today, couldn't help myself</p><p><a href="https://harbour.cafe/tags/flipperzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>flipperzero</span></a> <a href="https://harbour.cafe/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://harbour.cafe/tags/cracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cracking</span></a> <a href="https://harbour.cafe/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a> <a href="https://harbour.cafe/tags/blackhat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blackhat</span></a> <a href="https://harbour.cafe/tags/hacktheplanet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacktheplanet</span></a></p>
Cyber Tips Guide<p>Become an Ethical Hacker: Master coding, network security, and OS knowledge. Pursue degrees and certs like PenTest+, CEH, and OSCP. My article breaks down the path, skills, education, and experience needed. <a href="https://mastodon.social/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a> <a href="https://mastodon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a><br>👉 <a href="https://zurl.co/sOqN" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">zurl.co/sOqN</span><span class="invisible"></span></a></p>
Scripter :verified_flashing:<p>Gesetzentwurf vorgelegt: White-Hat-Hacker sollen künftig straffrei bleiben - Golem.de<br><a href="https://www.golem.de/news/gesetzentwurf-vorgelegt-weisse-hacker-sollen-kuenftig-straffrei-bleiben-2411-190463.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/gesetzentwurf-vo</span><span class="invisible">rgelegt-weisse-hacker-sollen-kuenftig-straffrei-bleiben-2411-190463.html</span></a> <a href="https://social.tchncs.de/tags/WhiteHats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHats</span></a> <a href="https://social.tchncs.de/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a> <a href="https://social.tchncs.de/tags/WhiteHatHacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHatHacker</span></a> <a href="https://social.tchncs.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a></p>
Prof. Dr. Dennis-Kenji Kipker<p>Das Bundesministerium der Justiz (<a href="https://chaos.social/tags/BMJ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BMJ</span></a>) hat nun heute auch den <a href="https://chaos.social/tags/Referentenentwurf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Referentenentwurf</span></a> eines Gesetzes zur Modernisierung vom <a href="https://chaos.social/tags/Computerstrafrecht" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Computerstrafrecht</span></a> veröffentlicht:</p><p>"Ziel dieses Entwurfs ist die klare gesetzliche Abgrenzung von nicht zu missbilligendem Handeln der IT-Sicherheitsforschung von strafwürdigem Verhalten. Der Gesetzentwurf soll die bestehende Rechtsunsicherheit beseitigen." <a href="https://chaos.social/tags/Hackerparagraf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hackerparagraf</span></a> <a href="https://chaos.social/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a></p><p>Zum Download geht es hier: <a href="https://intrapol.org/wp-content/uploads/2024/11/BMJ_Ref-E_ComputerStrafR.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">intrapol.org/wp-content/upload</span><span class="invisible">s/2024/11/BMJ_Ref-E_ComputerStrafR.pdf</span></a></p>
Rudi K.<p><span class="h-card" translate="no"><a href="https://die-partei.social/@golem" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>golem</span></a></span> "Weiße Hacker" ist schon ein sehr missverständlicher Begriff. Ein Schelm, wer Falsches dabei denkt ... 😇 <a href="https://mastodon.social/tags/Whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whitehat</span></a></p>
Investigator515<p>Cybersecurity Evolution: Ethical hacking, coined in 1995 by IBM's John Patrick, transformed curiosity into an essential cybersecurity practice. This would lead to the bug bounty programs we'd see today.</p><p><a href="https://mastodon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://mastodon.social/tags/CyberSecurityEvolution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityEvolution</span></a> <a href="https://mastodon.social/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a> <a href="https://mastodon.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bugbounty</span></a></p>
Troed Sångberg<p>This all might improve with CNAs, but I am slightly frustrated with the <a href="https://ioc.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> process through <a href="https://ioc.exchange/tags/Mitre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mitre</span></a> atm. I applied for a CVE number 1 1/2 months ago and got a reply after three weeks stating that the vulnerability did not qualify for a CVE.</p><p>I'm quite sure this was due to a misunderstanding since the application asks us to be brief rather than laying out a lot of details, so I replied with how I do believe it does (basically, they thought the attacker don't have physical access in the normal use case, which they do) and apologized for not having expanded in detail - and did.</p><p>That was two weeks ago. I get having a queue where it can take three weeks for the initial response, but if it's going to be three weeks for every reply in a back'n'forth then there will be no CVE allocated once the 90 day disclosure period is up.</p><p>The vendor? Yeah they acted immediately on the report. But this is a case where I think the vulnerable customers would gain from CVE communication.</p><p><a href="https://ioc.exchange/tags/Whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Whitehat</span></a> <a href="https://ioc.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a></p>
Troed Sångberg<p>90 days embargo begins now.</p><p>Do I have a story to tell you afterwards :P</p><p>There will be both a blog and videos of me hacking away at one of the most well-secured devices I've had the pleasure to reverse engineer.</p><p><a href="https://ioc.exchange/tags/whitehat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitehat</span></a></p>