🚨 HIGH: CVE-2026-4565 — Tenda AC21 (16.03.08.16) has a remote buffer overflow in /goform/SetNetControlList. Public exploit out; full device compromise possible. Disable WAN admin, monitor, and segment networks ASAP.
https://radar.offseq.com/threat/cve-2026-4565-buffer-overflow-in-tenda-ac21-5d23ce15 #OffSeq #Vulnerability #NetSec #RouterOSINT Isn’t About Skill Anymore. It’s About Systems
There’s a moment, if you spend enough time in this space, where your attention changes.
You stop looking at individual data points as things to extract. You start seeing them as inputs to a larger structure.
https://cha1nc0der.wordpress.com/2026/03/21/osint-isnt-about-skill-anymore-its-about-systems/
Lightning Network Privacy Analysis: Timing Correlation Attacks in Payment Routing
https://discuss.tchncs.de/post/56842800
Lightning Network Privacy Analysis: Timing Correlation Attacks in Payment Routing - tchncs
Just finished analyzing timing correlation attacks against Lightning payment
privacy. Sharing findings with the security community. The Problem: Most
Lightning privacy discussions focus on onion routing, but miss timing-based
deanonymization: 1. Immediate forwarding creates timing signatures 2. Fixed
delay patterns are fingerprintable
3. Consistent channel selection for similar amounts reveals routing patterns
Mitigation Strategies: - Random delays (200-800ms) between receiving and
forwarding - Occasional decoy forwards to break timing patterns - Channel
selection randomization for similar route/amount combinations Research Methods:
Tested on signet with 50 simulated routing nodes. Timing correlation attacks had
73% accuracy without mitigations, dropped to 12% with proper countermeasures.
Questions for the community: - Has anyone implemented similar privacy
protections? - What other Lightning privacy vectors concern you? - Interest in
more detailed technical writeup? Building privacy tools for Lightning operators.
Happy to discuss implementation details.
Lightning Network Privacy Analysis: Timing Correlation Attacks in Payment Routing
https://discuss.tchncs.de/post/56840969
Lightning Network Privacy Analysis: Timing Correlation Attacks in Payment Routing - tchncs
Just finished analyzing timing correlation attacks against Lightning payment
privacy. Sharing findings with the security community. The Problem: Most
Lightning privacy discussions focus on onion routing, but miss timing-based
deanonymization: 1. Immediate forwarding creates timing signatures 2. Fixed
delay patterns are fingerprintable
3. Consistent channel selection for similar amounts reveals routing patterns
Mitigation Strategies: - Random delays (200-800ms) between receiving and
forwarding - Occasional decoy forwards to break timing patterns - Channel
selection randomization for similar route/amount combinations Research Methods:
Tested on signet with 50 simulated routing nodes. Timing correlation attacks had
73% accuracy without mitigations, dropped to 12% with proper countermeasures.
Questions for the community: - Has anyone implemented similar privacy
protections? - What other Lightning privacy vectors concern you? - Interest in
more detailed technical writeup? Building privacy tools for Lightning operators.
Happy to discuss implementation details.
Lightning Network Privacy Analysis: Timing Correlation Attacks in Payment Routing
https://discuss.tchncs.de/post/56839976
Lightning Network Privacy Analysis: Timing Correlation Attacks in Payment Routing - tchncs
Just finished analyzing timing correlation attacks against Lightning payment
privacy. Sharing findings with the security community. The Problem: Most
Lightning privacy discussions focus on onion routing, but miss timing-based
deanonymization: 1. Immediate forwarding creates timing signatures 2. Fixed
delay patterns are fingerprintable
3. Consistent channel selection for similar amounts reveals routing patterns
Mitigation Strategies: - Random delays (200-800ms) between receiving and
forwarding - Occasional decoy forwards to break timing patterns - Channel
selection randomization for similar route/amount combinations Research Methods:
Tested on signet with 50 simulated routing nodes. Timing correlation attacks had
73% accuracy without mitigations, dropped to 12% with proper countermeasures.
Questions for the community: - Has anyone implemented similar privacy
protections? - What other Lightning privacy vectors concern you? - Interest in
more detailed technical writeup? Building privacy tools for Lightning operators.
Happy to discuss implementation details.
Free browser privacy audit — DNS leaks, WebRTC, fingerprinting, headers analysis in 30 seconds
https://discuss.tchncs.de/post/56833466
Free browser privacy audit — DNS leaks, WebRTC, fingerprinting, headers analysis in 30 seconds - tchncs
Built a comprehensive privacy audit that runs 6 tests and gives a privacy score.
Useful for quickly checking if your VPN/browser setup is actually working. Also
published a Privacy Hardening Guide [http://5.78.129.127/privacy-guide]
covering: - Firefox about:config hardening - DNS-over-HTTPS setup (every OS) -
VPN kill switch configs - WebRTC disable - OS telemetry removal All free, no
signup needed.
Free browser privacy audit — DNS leaks, WebRTC, fingerprinting, headers analysis in 30 seconds
https://discuss.tchncs.de/post/56831964
Free browser privacy audit — DNS leaks, WebRTC, fingerprinting, headers analysis in 30 seconds - tchncs
Built a comprehensive privacy audit that runs 6 tests and gives a privacy score.
Useful for quickly checking if your VPN/browser setup is actually working. Also
published a Privacy Hardening Guide [http://5.78.129.127/privacy-guide]
covering: - Firefox about:config hardening - DNS-over-HTTPS setup (every OS) -
VPN kill switch configs - WebRTC disable - OS telemetry removal All free, no
signup needed.
Using Lightning micropayments as anti-spam: 100 sats ($0.07) blocks bots without CAPTCHAs or accounts
https://discuss.tchncs.de/post/56812948
Using Lightning micropayments as anti-spam: 100 sats ($0.07) blocks bots without CAPTCHAs or accounts - tchncs
Interesting pattern I stumbled into while building a pastebin service.
Traditional anti-spam for public services: - CAPTCHAs (hostile UX, accessibility
nightmare) - Account registration (privacy cost, email harvesting) - Rate
limiting by IP (shared IPs, VPNs break this) - API keys (signup wall in
disguise) What if the anti-spam mechanism is just… a tiny payment? ## How It
Works I built a pastebin where: - Free pastes: 500 characters, temporary - Paid
pastes: 100,000 characters, permanent — costs 100 sats (~$0.07) Payment is via
Bitcoin Lightning Network. No account. No email. No CAPTCHA. Scan a QR code, pay
7 cents, paste is live. ## Why This Works as Anti-Spam 1. Economic barrier:
Spamming 1,000 pastes costs $70. Not worth it for SEO spam. 2. No identity
required: Privacy-preserving. No email, no account, no tracking. 3. Instant
verification: Lightning payments settle in <100ms. Faster than CAPTCHA solving.
4. No false positives: If you paid, you are not spam. Period. No AI
classification needed. 5. Progressive trust: Small amount = low barrier for
legitimate users, high barrier at scale for attackers. ## Limitations - Requires
Lightning wallet (adoption still low) - Not suitable for services that need to
be completely free (e.g., emergency info) - Payment UX varies by wallet - 7
cents feels like a lot to some people (it is not, but perception matters) ## The
Broader Pattern This is basically Hashcash (proof-of-work anti-spam from the
90s) but with real money instead of CPU cycles. Same principle: make spam
expensive without requiring identity. Anyone else experimenting with
micropayment-based access control? Curious if this pattern has legs beyond niche
use cases.
Testing HTTP security headers at scale — free analyzer tool I built
https://discuss.tchncs.de/post/56789540
Testing HTTP security headers at scale — free analyzer tool I built - tchncs
I’ve been running security header checks on the top 1000 websites and the
results are concerning. Built a tool to make this easy for anyone:
https://devtoolkit.dev/headers [https://devtoolkit.dev/headers] It checks for: -
Content-Security-Policy (and whether it’s actually restrictive) -
Strict-Transport-Security (including preload) - X-Content-Type-Options -
X-Frame-Options - Referrer-Policy - Permissions-Policy - X-XSS-Protection
(deprecated but still checked) Gives a 0-100 score with specific recommendations
for each missing/weak header. Interesting findings: - ~40% of sites I tested are
missing CSP entirely - Many sites set HSTS but with short max-age (< 1 year) -
X-Frame-Options is still commonly used but CSP frame-ancestors is better -
Permissions-Policy adoption is shockingly low No signup, no tracking, no data
collection. Just paste a URL and get results. Also have a full browser privacy
audit if you want to test your own setup: https://devtoolkit.dev/privacy-audit
[https://devtoolkit.dev/privacy-audit] Feedback welcome — especially on what
other checks would be useful.