Posts
- Demonstrates how WhatsApp delivery receipt timing can be used as a side-channel to infer a user’s device activity and online state without sending visible messages.
- Reflections on how societies slip into silence and complicity, inspired by They Thought They Were Free.
- How to use Automated Tools to conduct a Vulnerability Assessment
- In this guide, I'll show you how to boot into a corrupted Windows OS, reset your Windows password, and recover deleted files.