mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

6K
active users

#FlipperZero

2 posts1 participant0 posts today

Lilbits: Perplexity’s AI-based web browser, an open source Flipper Zero clone, and another Ryzen AI Max+ 395 mini PC

AI company Perplexity has officially entered the browser business. While the Comet web browser is based on Google’s open source Chromium browser, it’s built to let AI do a lot of the work for you. Instead of entering a URL or typing a search query, you can tell the browser what you’re looking for by text or voice and it will try to find it for you. It can also summarize the content of […]

#ai #android #aoostar #aoostarNex395 #clockworkpiUconsole #comet #computeModule #flipperZero #flopperZiro #google #hackingTool #lilbits #miniPc #notificationOrganizer #notifications #openHardware #radxaCm5 #strixHalo #webBrowsers

Read more: liliputing.com/lilbits-perplex

Happy Monday Fediverse!

Today I'm trying to start on a quest to knock out a long to-do list that crept up with holiday travel.

Although, right now I'm in limbo on a couple of things so I'm futzing with my #FlipperZero while I wait - specifically trying to see what I can do with a hotel keycard I "collected" over the weekend. Turns out it has been a while since I used this thing, and it needed a beefy firmware update.

Nachdem ich heute entdeckt habe das man sich schon für ca. 7€ inkl. Porto Platinen professionell erstellen lassen kann habe ich mal KiCad ausprobiert für ein Flipper Zero Board mit meinen Sensoren.

KiCad zeigt mir noch zwei Fehler an für die 2 GND Verbindungen, die laut KiCad zu Pin 8 und 18 gehen sollen.
Die 2 Leiterbahnen sind aber korrekt mit Pin 11 verbunden.

Radio Frequency Identification cards used for building access and payment systems create a false sense of security through proximity based authentication that's trivially defeated with cheap hardware. Tools like the Proxmark3 and Flipper Zero can read, clone, and emulate most low frequency RFID cards within seconds, allowing attackers to duplicate access credentials by simply walking past targets in crowded areas. Many organizations still deploy basic 125kHz cards that transmit static identifiers with no encryption, making them as secure as writing your password on a sticky note. Even supposedly secure HID Prox cards and hotel key cards fall victim to replay attacks and cryptographic weaknesses that researchers have documented for over a decade. The persistence of vulnerable RFID systems in high security environments demonstrates how legacy technology and misplaced trust in "proprietary" solutions continue to create massive security gaps.
#RFID #Proxmark3 #FlipperZero #physicalsecurity #hacking

Today's "silly use case for stuff": I have a Flipper I use a criminally small amount. It's basically an overly aggressive remote control for stuff around my apartment at this point.

I forgot to turn off my AC in my living room (one of the big not-quite-window-units.) The flipper has the ability to control it, and it's in the living room

Remote control flipper, hit the power control via it to turn off the AC.

Modern problems, modern solutions.