17
2
submitted 2 weeks ago by Pro@programming.dev to c/videos@lemmy.world

In November 2021 thousands of migrants are trying to enter the EU across Poland‘s border with Belarus. Polish activists receive urgent calls for help. But it‘s not only the migrants who come up against borders, the activists do too.

69
submitted 2 weeks ago by Pro@programming.dev to c/world@lemmy.world

Satellite imagery taken after the US strike on Iran's Fordow site showed smoke rising from the fuel enrichment plant. US President Donald Trump claimed key Iranian nuclear sites had been "obliterated," while Iran claimed it had removed nuclear material from the sites before the strikes.

219

We will use Grok 3.5 (maybe we should call it 4), which has advanced reasoning, to rewrite the entire corpus of human knowledge, adding missing information and deleting errors.

Then retrain on that.

Far too much garbage in any foundation model trained on uncorrected data.

Source.

More Context

Source.

Source.

16
5
submitted 2 weeks ago by Pro@programming.dev to c/videos@lemmy.world

In this video, Mishaal Khan walks through real-world OSINT techniques that show how anyone can be found online using free, publicly available tools. David is joined by Mishaal who demonstrates how to go from basic Google searches to advanced data extraction using license plates, phone numbers, email addresses, and usernames. He covers tools and methods that range from simple people search websites to advanced techniques using breach data, APIs, metadata extraction, and more.

Topics covered include:

  • Google Dorking and advanced search engines (Yandex, DuckDuckGo, Bing)
  • People and phone number search tools (FastPeopleSearch, Sync.Me, TrueCaller)
  • Social media enumeration (WhatsMyName.app, Maigret, Holehe)
  • Image and location analysis (Google Street View, GeoINT, Wigle.net)
  • Historical Whois and DNS lookups (Whoxy, WebTechSurvey)
  • Vehicle and VIN lookup via Carvana, O’Reilly Auto, Turo, and government APIs
  • OSINT through metadata in Google Docs and social media profiles
  • Automation with tools like Burp Suite, Caido, and Postman
  • Breach data investigation using HaveIBeenPwned and offline breach dumps
  • Real-world examples including voter databases, hotel Wi-Fi systems, and email profiling

This is a detailed, scenario-driven walkthrough of how OSINT is used in real investigations, not just theory. The video also touches on operational security (OpSec) and the limits of privacy in a world where so much personal data is available to anyone who knows where to look.

3
submitted 2 weeks ago by Pro@programming.dev to c/videos@lemmy.world

Thorium has been the holy grail of energy production for the better part of a century so when China announced they got one working it took the world by surprise. The twist? It was built on declassified American research. In this episode we take a look.

-11
125

I had the thrill of a lifetime, hosting dinner for Bill Gates, Linus Torvalds and David Cutler. Linus had never met Bill, and Dave had never met Linus. No major kernel decisions were made, but maybe next dinner 😉

Source.

49
49
submitted 2 weeks ago by Pro@programming.dev to c/science@lemmy.world
13
submitted 2 weeks ago by Pro@programming.dev to c/science@mander.xyz
view more: ‹ prev next ›

Pro

joined 2 months ago