Hotel Existence
All Posts Categories All Projects Workplace Articles About
Hotel Existence
All PostsCategoriesAll ProjectsWorkplace ArticlesAbout

 Cybersecurity

2025

Share a Secret Code Word to Bypass LLM Censorship 02-01

2024

Further Thoughts on Stealth AirTags 12-29

2023

Who watches the certificate authorities? 01-03

2022

Exploring Bluetooth Trackers at GeekWeek 7.5 05-21

2021

Voice Assistant File Transfer Protocol: Encodes files verbally and transfer them through the Alexa voice assistant 01-02

2020

Protect Your Users from Credential Stuffing Attacks: Ensure they aren't using passwords known to be breached 12-02
Mesh network in my neighborhood. Not how I had envisioned it. 11-24
Use Browser Automation to Monitor And Detect Magecart-style Web Skimming Attacks 01-04

2018

Ask not if our product uses Apache Struts, but... 12-11
Security: Not a new problem 04-30
Powered by Hugo | Theme - LoveIt
2010 - 2025 Richard Audette | CC BY-NC 4.0