SDF Chatter
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 1 year ago

A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask

www.wired.com

external-link
message-square
36
fedilink
123
external-link

A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask

www.wired.com

Lanky_Pomegranate530@midwest.socialM to Cybersecurity@sh.itjust.worksEnglish · 1 year ago
message-square
36
fedilink
As “P4x,” Alejandro Caceres single-handedly disrupted the internet of an entire country. Then he tried to show the US military how it can—and should—adopt his methods.
  • mx_smith@lemmy.world
    link
    fedilink
    English
    arrow-up
    22
    ·
    1 year ago

    “cybersecurity entrepreneur with hacker tattoos on both arms“ what’s a hacker tattoo? Your IP address? This article was really short on how he did it.

    • sugar_in_your_tea@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      18
      ·
      1 year ago

      Nah, the Kali Linux logo. Everyone knows using Kali makes you a hacker, and getting a kali tat gives you immediate hacker xp.

    • kamenLady.@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      ·
      1 year ago

      Everyone knows that hacker tattoos enable their wearer to be able to do sick hacks. The better the tattoo, the better the hacker skill.

    • SpruceBringsteen@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      ·
      1 year ago

      Goatse qr code

    • Scrappy@feddit.nl
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      There is a picture in the article. Its his previous handle and a what looks like a md5 hash along his entire left arm from hand to shoulder.

Cybersecurity@sh.itjust.works

cybersecurity@sh.itjust.works

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 83 users / day
  • 369 users / week
  • 1.38K users / month
  • 4.84K users / 6 months
  • 106 local subscribers
  • 7.22K subscribers
  • 2.76K Posts
  • 5.34K Comments
  • Modlog
  • mods:
  • Kid@sh.itjust.works
  • Lanky_Pomegranate530@midwest.social
  • BE: 0.19.8
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org