backup: 2024-03-30 09:59
This commit is contained in:
parent
a8ab9f05dc
commit
b373e484af
|
@ -11,9 +11,10 @@
|
|||
leading: 0.52em,
|
||||
)
|
||||
|
||||
#align(center, text(20pt)[
|
||||
#align(left, text(20pt)[
|
||||
*An overview on hoaxes*
|
||||
])
|
||||
#line(length: 70%)
|
||||
|
||||
= Introduction
|
||||
In recent times, hoaxes have become increasingly prevalent as the
|
||||
|
|
|
@ -1,7 +1,20 @@
|
|||
#show link: underline
|
||||
#set text(
|
||||
font: "ETBembo",
|
||||
size: 10pt)
|
||||
#set page(
|
||||
paper: "a4",
|
||||
margin: 1cm,
|
||||
)
|
||||
#set par(
|
||||
justify: true,
|
||||
leading: 0.52em,
|
||||
)
|
||||
|
||||
#align(left, text(20pt)[
|
||||
*Misconceptions about NFC*
|
||||
])
|
||||
#line(length: 70%)
|
||||
|
||||
#align(left, text(10pt)[*I made a mistake while writing this blog
|
||||
post - somehow forgetting that security isn’t unambiguous. You can
|
||||
|
@ -27,8 +40,7 @@ people have about NFC.
|
|||
= The Misconceptions
|
||||
== Inspiration
|
||||
While talking with a friend on a WhatsApp group chat a few days ago
|
||||
about a program I found on my jailbroken iOS device -
|
||||
#link("https://github.com/Aemulo")[Aemulo] - I was informed of 'subway
|
||||
about a program I found on my jailbroken iOS device - link("https://github.com/Aemulo")[Aemulo] - I was informed of 'subway
|
||||
skimmers'; devices that could #emph[supposedly] read data from
|
||||
contactless-enabled devices \(via NFC) and would be able to emulate
|
||||
them.
|
||||
|
@ -41,7 +53,6 @@ my first thought was:
|
|||
think that it was rightfully so.
|
||||
|
||||
== What exactly is wrong with this?
|
||||
<what-exactly-is-wrong-with-this>
|
||||
Several things. I’m no expert in cybersecurity - everyone’s a student in
|
||||
some way, but I was sure that NFC was, as it’s name implies, for
|
||||
#strong[near-field communication];. I’m repeating myself here, but
|
||||
|
|
|
@ -11,9 +11,10 @@
|
|||
leading: 0.52em,
|
||||
)
|
||||
|
||||
#align(center, text(20pt)[
|
||||
#align(left, text(20pt)[
|
||||
*An overview on hoaxes*
|
||||
])
|
||||
#line(length: 70%)
|
||||
|
||||
= Introduction
|
||||
#link("https://docs.searxng.org/")[SearXNG];, put in its own words, is a
|
||||
|
|
|
@ -15,6 +15,7 @@
|
|||
#align(center, text(20pt)[
|
||||
*Take control of tailscale with headscale*
|
||||
])
|
||||
#line(length: 70%)
|
||||
|
||||
= Tailscale
|
||||
#link("https://tailscale.com/")[Tailscale] is a modern tunnel VPN
|
||||
|
|
|
@ -14,6 +14,7 @@
|
|||
#align(center, text(20pt)[
|
||||
*Selecting hardware for a (home) server*
|
||||
])
|
||||
#line(length: 70%)
|
||||
|
||||
= Introduction
|
||||
I see a lot of people worryingly mistaken about what a server needs
|
||||
|
|
|
@ -14,6 +14,7 @@
|
|||
#align(center, text(20pt)[
|
||||
*Setting up Zola on NixOS*
|
||||
])
|
||||
#line(length: 70%)
|
||||
|
||||
= Introduction
|
||||
#link("https://getzola.org")[Zola] is a static site generator
|
||||
|
|
Reference in a new issue