commit b8488ac4cac9ede57d95e98f2d94251db80e8951 parent a3b79c1833a816df28d2b4a162c9d02d1d17c47b Author: d-s <ds@voyager.local> Date: Thu, 30 Mar 2023 12:32:22 +0200 feat: article for 2023-03-30 Diffstat:
4 files changed, 19 insertions(+), 0 deletions(-)
diff --git a/assets/ytcovers/8PmkUPBhL4U.jpg b/assets/ytcovers/8PmkUPBhL4U.jpg Binary files differ. diff --git a/content/2023/how-did-phreaking-work.md b/content/2023/how-did-phreaking-work.md @@ -0,0 +1,19 @@ +--- +title: "How Did Phreaking Work?" +category: "hardware" +abstract: A short movie explaining how it worked. +date: 2023-03-30T12:30:30+02:00 +year: 2023 +draft: false +tags: +- TIL +- phreaking +- hacking +--- +Reading about people abusing machines to achieve anything was unbelievably cool when I was a kid. Back then, they were called hackers, but nowadays, this name is taken over by Russian kids encrypting data on hospital networks. + +One of those magical things was phreaking - a way to gain control over telephone networks. There [were brute force ways](https://youtu.be/Sy9DueBpHx8) and intelligent methods. + +A few days ago, [Connections Museum](https://www.youtube.com/@ConnectionsMuseum) published a vlog explaining how the [Blue Box](https://en.wikipedia.org/wiki/Blue_box) worked. It's well worth the time! + +{{<youtube "8PmkUPBhL4U" "2600? How Phreaking Really Worked">}} diff --git a/resources/_gen/images/8PmkUPBhL4U_hu44beea80a607028d5ed00a81d7e708b3_43517_0x300_resize_q90_h2_box.webp b/resources/_gen/images/8PmkUPBhL4U_hu44beea80a607028d5ed00a81d7e708b3_43517_0x300_resize_q90_h2_box.webp Binary files differ. diff --git a/resources/_gen/images/8PmkUPBhL4U_hu44beea80a607028d5ed00a81d7e708b3_43517_0x600_resize_q90_h2_box.webp b/resources/_gen/images/8PmkUPBhL4U_hu44beea80a607028d5ed00a81d7e708b3_43517_0x600_resize_q90_h2_box.webp Binary files differ.