GitHub MCP Exploited: Accessing private repositories via MCP https://invariantlabs.ai/blog/mcp-github-vulnerability
Hacker, wearer of fake moustaches, breaker of things, and senior-level procrastinator. Remember, it could be worse, it could be raining! π€
GitHub MCP Exploited: Accessing private repositories via MCP https://invariantlabs.ai/blog/mcp-github-vulnerability
So, since when does ChatGPT use request information (e.g., IP address) to determine the user's location? Shouldn't it just be using the prompt data? π€ #chatgpt
Ripping a page right out of @deviantollam 's air travel book. I started using this pouch for transatlantic flights, hooked onto the seat in front of me with 2 little carabiners. But I know myself. If I don't document this properly, I'll be wondering how I packed it out the last time. π
The demoscene has become a national UNESCO heritage in Sweden! I was part of making the application, so ofc I think it's great, but I wrote a little bit about how difficult it is to generalize the demoscene. https://www.goto80.com/the-demoscene-as-a-unesco-heritage-in-sweden
#VRTNWS verspreidt gevaarlijke desinformatie over #Signal. Ze claimen dat inlichtingendiensten de encryptie kunnen "kraken"βzonder enige onderbouwing. Dit brengt journalisten & activisten in gevaar. Blogpost met factcheck: π https://www.rubdos.be/2025/03/26/vrt-verspreidt-desinformatie-over-signal.html
#signalapp #vrt #desinformatie
When Your Threat Model Is Being a Moron
https://www.404media.co/when-your-threat-model-is-being-a-moron-signal/
Make it happen Cupertino!
RE: https://www.threads.net/@thebasicappleguy/post/DHrFnBoNFSa
#Severance
"When we're in like a chat with friends..." π https://www.youtube.com/watch?v=ModcAfwJI2E
Liven up the group chats you're in by posting any or all of these images along with some bullshit bombastic emojis like πΊπΈπ€π€π·πΊπ§ββοΈπ₯΅ππ¦ then abruptly delete it all about 15 minutes later, saying something like "Wait, shit, is this the chat WITH reporters or WITHOUT reporters??"
The Trump Administration Accidentally Texted Me Its War Plans - The Atlantic
By making minor changes to command-line arguments, it is possible to bypass EDR/AV detections.
My research, comprising ~70 Windows executables, found that all of them were vulnerable to this, to varying degrees.
Hereβs what I found and why it matters π https://wietze.github.io/blog/bypassing-detections-with-command-line-obfuscation
@crahan indeed, I have a whole little video about it!...
@deviantollam, ask for a brand name, get a whole video explaining the ins, outs, and whys of the setup.
Absolute perfection! π
Download the 6K Wallpaper: https://basicappleguy.com/haberdashery/the-exalted-victory-of-cold-harbor
@deviantollam that looks like an interesting little pouch. You have any details about the model and brand? Asking for an EDC friend! π