caetra new release v1.1.0; added new shield to react when the CD-DVD-ROM tray opens or closes.
https://github.com/carvilsi/caetra?tab=readme-ov-file#12-cd_dvd_rom
#physicalSecurity #physicalAttacks #linuxhardening #hardwareSecurity #bpf #ebpF #bcc
caetra new release v1.1.0; added new shield to react when the CD-DVD-ROM tray opens or closes.
https://github.com/carvilsi/caetra?tab=readme-ov-file#12-cd_dvd_rom
#physicalSecurity #physicalAttacks #linuxhardening #hardwareSecurity #bpf #ebpF #bcc

In a Berlin hackerspace, fifty enthusiasts gathered around a 40-year-old computer to create new things. BCC#20, hosted by the C64 Club Berlin at C-Base, celebrated many c-words: craft, constraints, and Commodore. Let me tell you how beige machines glow under spaceship lighting, how questionable karaoke singers are accompanied by beautiful chip music, and how 64 kilobytes are enough to create digital worlds!
Jo Chen, Dan Jurgens, Terry Moore, Ryan Ottley, David Petersen, and Thom Zahler are coming to Baltimore Comic Con #baltimorecomiccon #bcc #bcc2026
Jim Lee Returns to Baltimore Comic-Con for 2026 #baltimorecomiccon #bcc #bcc2026
Just released v1.0.1 of Caetra: Linux Physical Security based on eBPF.
๐ Fix bug related with bcc v0.35.0 (supports up to Linux 6.14), adding missing struct "bpf_task_work" to support kernel 6.18.5
๐ฃ๐ฒ๐ป๐๐ถ๐ผ๐ฒ๐ป๐ณ๐ผ๐ป๐ฑ๐ ๐ฒ๐ถ๐๐ 7,5 ๐บ๐ถ๐น๐ท๐ผ๐ฒ๐ป ๐ฒ๐๐ฟ๐ผ ๐๐ฎ๐ป ๐ฏ๐ฒ๐๐๐๐๐ฟ๐ฑ๐ฒ๐ฟ๐ ๐ณ๐ฎ๐ถ๐น๐น๐ถ๐ฒ๐๐ฒ ๐๐ถ๐ป๐ธ๐ฒ๐น๐ธ๐ฒ๐๐ฒ๐ป ๐๐๐
Het Pensioenfonds Detailhandel heeft de voormalige bestuurders van de failliete elektronicaketen BCC en het moederbedrijf Mirage Retail Groep aansprakelijk gesteld voor 7,5 miljoen euro aan onbetaalde pensioenpremies.
Het Pensioenfonds Detailhandel heeft de voormalige bestuurders van de failliete elektronicaketen BCC en het moederbedrijf Mirage Retail Groep aansprakelijk gesteld voor 7,5 miljoen euro aan onbetaalde pensioenpremies.
This is what I did for the
eBPF Summit: Hackathon Edition 2025
Caetra uses eBPF (extended Berkeley Packet Filters) to try secure a Linux machine against physical threats, or at least be aware about a potential attack, monitoring kernel kprobes related with hardware interactions. It uses BPF Compiler Collection BCC to do the kernel tracing and manipulation program.
In order to notify the user or cybersecurity team uses @ThinkstCanary and/or TelegramBot.
@dianea @meluzzy in #GDPR-land and espechally #Germany this would get really expensive and most likely get the doctor reprimanded for doxxing his clients, violating confidentiality.
To field...[This](https://woof.tech/@meluzzy/115629453447514455) is such basic #InfoSec that it's painful: - *USE #BCC FFS!*