Everything you ever wanted to ask about Checkm8 and Checkra1n

What’s Checkm8? Checkm8 is an exploit (program exploiting OS or hardware vulnerabilities) aimed at obtaining access to the execution of its own software code at the earliest stage of iOS device loading. What makes it stand out? The richness, and honestly the hype, surrounding Checkm8 is that the vulnerability, which it is based, cannot be …

IoT Devices Can Solve Crimes. Tech Companies Don’t Want Them To.

From connected refrigerators to digital assistants and smart thermostats, the internet of things (IoT) is quickly transforming the way we interact with the world around us—and that transformation is just getting started. Adoption rates of internet-connected “smart” devices in every category are swelling, and the universe of those devices is expanding rapidly, with new products …

Signal Disruption

Signal – secure messenger for confidential communication In today’s world everyone is using messenger applications. Many users prefer using messengers that have strong encryption built-in for obvious reasons from confidentiality to hiding data from investigators.  One such app used by messengers due to the confidentiality and privacy they provide. Signal is one of these messengers …