The “Tiny Titans” of RF Hacking
Flipper Zero (Unleashed Firmware) vs. LilyGO T‑Embed CC1101 (Bruce Firmware) If you’ve ever sat in a café, watched the Wi‑Fi traffic swirl around your laptop, or simply wanted to play with radio frequencies…
Flipper Zero (Unleashed Firmware) vs. LilyGO T‑Embed CC1101 (Bruce Firmware) If you’ve ever sat in a café, watched the Wi‑Fi traffic swirl around your laptop, or simply wanted to play with radio frequencies…
In the past decade we’ve seen the rise of Artificial Intelligence (AI), specifically Large Language Models (LLMs) such as GP4, Claude, LLaMA, and their open‑source cousins. While these models have…
First lets talk about what is a “GhostPhone”, I have been seeing it a lot more lately and I want to clear somethings up. A “GhostPhone” is just a phone…
As cybersecurity threats become more advanced and persistent, defenders need ways to observe attackers in the wild—safely and legally. That’s where honeypots come in. Recently, I set up a T-Pot…
I know it use to be here not anymore 😀
To the people attempting unauthorized access to my website, This post is a direct warning to anyone trying to break into this site without permission. We’ve noticed multiple attempts to…
There’s a new player in the home automation space: Home Assistant Voice. It’s a more private solution, not connected to Google or Amazon. You can make one yourself, but it’ll…