Search
Items tagged with: hack
Weaponizing and Gamifying AI for WiFi Hacking
PITA as an automated #deauther and handshakes collector isn’t exactly what you’d define “smart”: the only thing it does is #deauthing everything while bettercap is doing its normal WiFi #scanning things in the background, every few seconds, constantly, while passively hoping for #handshakes.
#wifi #wardriving #hacking #hack #project #scan #handshake #pwnagotchi #RaspberryPiZero #raspberryPi #raspberry #knowledge #knowhow
Exploring the #Paramilitary #Leaks
Source: micahflee.com/exploring-the-pa…
#usa #politics #military #leak #hack #chat #Telegram #communication #society #deepstate
Exploring the Paramilitary Leaks
In January, Distributed Denial of Secrets published over 200 gigabytes of chat logs and recordings from paramilitary groups and militias, including American Patriots Three Percent (APIIII) and the Oath Keepers.Micah Lee (micahflee)
#AI reasoning models can #cheat to win #chess #games
source: technologyreview.com/2025/03/0…
Palisade’s team found that #OpenAI’s o1-preview attempted to #hack 45 of its 122 games, while #DeepSeek’s R1 model attempted to cheat in 11 of its 74 games.
#technology #fail #problem #game #rules #news
AI reasoning models can cheat to win chess games
These newer models appear more likely to indulge in rule-bending behaviors than previous generations—and there’s no way to stop them.Rhiannon Williams (MIT Technology Review)
Find my #hacker: How #Apple's #network can be a potential #tracking tool
Source: cec.gmu.edu/news/2025-02/find-…
#AirTag sends #Bluetooth messages to nearby Apple devices, which then anonymously relay its #location via Apple #Cloud to the owner for tracking. Their attack method can turn a device—whether it's a #desktop, #smartphone, or #IoT device—into an "AirTag" without Apple's permission, at which point the network begins tracking.
Turn of Bluetooth whenever you can! 😱
#news #technology #Software #Problem #hack #security #privacy #surveillance #spy #vulnerability
Find my hacker: How Apple's network can be a potential tracking tool
George Mason researchers discovered that Apple's "Find My" service can be used for malicious purposes.College of Engineering and Computing