199 Followers
342 Following
949 Posts

As a former developer, Iโ€™m primarily focused on offensive Application Security nowadays. Currently building some things in C++ and Qt as I enjoy desktop development as a break from the state of the modern web.

He/him

Companies can get $166B in illegal tariffs back. The people that paid them get nothing. And seemingly everyone in the US shrugs. Le sigh.

@mekkaokereke

Community colleges around Detroit offer construction/skilled trades associates' degrees.

If you're sorta healthy and don't have felonies, you can get a tuition+books+some living expenses scholarship for the first year. It's not all construction classes: they make sure you can balance a checkbook, read the instructions on med bottles, and understand how credit card interest works.

The second year of study comes with a living wage paid internship.

The jobs are there, and can't be outsourced overseas.

TL;DR North Korean-linked threat actors pulled off a $285M heist against crypto exchange Drift using IN-PERSON social engineering. They deployed proxies to global conferences to befriend Drift contributors, spent 6 months building a relationship as customers, and even deposited $1M of their own funds to prove they were legitimate.

โœจ๏ธโœจ๏ธโœจ๏ธ

Here is what happened:

๐Ÿ”น Starting in the fall of 2025, a group of individuals (later linked to North Korea) started attending international crypto conferences, with a goal in mind. These proxies were technically fluent, had fully constructed professional identities, with employment histories, and looked nothing like a North Korean.

๐Ÿ”น This group, posing as employees of a quantitative trading firm, first ๐š๐ฉ๐ฉ๐ซ๐จ๐š๐œ๐ก๐ž๐ ๐ฌ๐ฉ๐ž๐œ๐ข๐Ÿ๐ข๐œ ๐ƒ๐ซ๐ข๐Ÿ๐ญ ๐œ๐จ๐ง๐ญ๐ซ๐ข๐›๐ฎ๐ญ๐จ๐ซ๐ฌ ๐š๐ญ ๐š ๐ฆ๐š๐ฃ๐จ๐ซ ๐œ๐ซ๐ฒ๐ฉ๐ญ๐จ ๐œ๐จ๐ง๐Ÿ๐ž๐ซ๐ž๐ง๐œ๐ž ๐Ÿ๐š๐œ๐ž-๐ญ๐จ-๐Ÿ๐š๐œ๐ž. They wanted to discuss integrating with the platform.

๐Ÿ”น After the initial discussions, they moved their conversations to Telegram, where they spent months discussing legitimate trading strategies.

๐Ÿ”น "What a pleasant coincidence running into you again!"

Over the next 6 months, the attackers deliberately sought out these same contributors at multiple global conferences. They wanted to continue building trust and credibility.

๐Ÿ”น Dec. 2025 - Jan. 2026: To checkmate the game, the group onboarded an Ecosystem Vault on Drift. They engaged with the Drift contributors in working sessions, asked relevant & informed questions and eventually, they ๐๐ž๐ฉ๐จ๐ฌ๐ข๐ญ๐ž๐ ๐จ๐ฏ๐ž๐ซ $1 ๐ฆ๐ข๐ฅ๐ฅ๐ข๐จ๐ง ๐จ๐Ÿ ๐ญ๐ก๐ž๐ข๐ซ ๐จ๐ฐ๐ง ๐Ÿ๐ฎ๐ง๐๐ฌ ๐ข๐ง๐ญ๐จ ๐ญ๐ก๐ž ๐ฉ๐ซ๐จ๐ญ๐จ๐œ๐จ๐ฅ.

๐Ÿ”น (excerpt from Drift's Incident Update): "Integration conversations continued through February & March 2026. (...) By this point, the relationship was nearly half a year old. ๐“๐ก๐ž๐ฌ๐ž ๐ฐ๐ž๐ซ๐ž ๐ง๐จ๐ญ ๐ฌ๐ญ๐ซ๐š๐ง๐ ๐ž๐ซ๐ฌ; ๐ญ๐ก๐ž๐ฒ ๐ฐ๐ž๐ซ๐ž ๐ฉ๐ž๐จ๐ฉ๐ฅ๐ž ๐ƒ๐ซ๐ข๐Ÿ๐ญ ๐œ๐จ๐ง๐ญ๐ซ๐ข๐›๐ฎ๐ญ๐จ๐ซ๐ฌ ๐ก๐š๐ ๐ฐ๐จ๐ซ๐ค๐ž๐ ๐ฐ๐ข๐ญ๐ก ๐š๐ง๐ ๐ฆ๐ž๐ญ ๐ข๐ง ๐ฉ๐ž๐ซ๐ฌ๐จ๐ง. (...) Links were shared for projects, tools, and apps they claimed to be building"

๐Ÿ”น ๐€ ๐ซ๐ž๐ฅ๐š๐ญ๐ข๐จ๐ง๐ฌ๐ก๐ข๐ฉ ๐ก๐š๐ ๐›๐ž๐ž๐ง ๐ž๐ฌ๐ญ๐š๐›๐ฅ๐ข๐ฌ๐ก๐ž๐, ๐œ๐จ๐ง๐ญ๐ซ๐ข๐›๐ฎ๐ญ๐จ๐ซ๐ฌ ๐๐ข๐๐ง'๐ญ ๐ญ๐ก๐ข๐ง๐ค ๐ญ๐ฐ๐ข๐œ๐ž ๐ฐ๐ก๐ž๐ง ๐œ๐จ๐ฅ๐ฅ๐š๐›๐จ๐ซ๐š๐ญ๐ข๐ง๐  ๐๐ข๐ ๐ข๐ญ๐š๐ฅ๐ฅ๐ฒ. Drift presumes there may have been multiple technical attack vectors: One contributor may have been compromised after cloning a code repository shared by the group as part of efforts to deploy a frontend for their vault. A second contributor was persuaded into downloading a wallet product via Apple's TestFlight to beta test the app.

On April 1, 2026, as the $285 million was drained, the attackers scrubbed their Telegram chats and vanished.

(Full Incident Background Update from Drift is on X.)

\o/ VLC in space

@videolan

"Why are there almost no Republican scientists? Itโ€™s not a mystery. GOP political orthodoxy includes positions that are at odds with the scientific consensus on multiple issues, ranging from the validity of the theory of evolution, to the reality of climate change, to the efficacy and safety of vaccines. In each case the scientific consensus is solidly grounded in evidence."

~ Paul Krugman

#Trump #Repubicans #science #research #facts #truth
/1

https://paulkrugman.substack.com/p/maga-is-winning-its-war-against-us

MAGA Is Winning Its War Against U.S. Science

When a political movement believes that ignorance is strength

Paul Krugman

I am currently looking for Senior Software Engineers positions in Vienna. I am most proficient in Rust and C++, but I have worked with other languages as well (Python, Go, Typescript) and I have done some DevOps/Infra work too (Kubernetes, Docker, Terraform). If you stumble into something that may be a match, don't hesitate to reach

#fedihire #fedihire_at

AI cars this, AI trucks that; I've seen Thomas the Tank Engine they're going to be insufferable
๐Ÿ”’Want to build privacy tools that protect people worldwide? The Tor Project is hiring a Senior Android Engineer/Mobile Team Lead to own the technical direction of Tor Browser for Android & lead a brand-new mobile team. Deadline to apply: April 10. ๐Ÿ‘‰ torproject.org/about/jobs/senior-mobile-team-lead

There is a fresh thing going around about LinkedIn scanning extensions installed in Chrome/Chromium:
https://browsergate.eu/

The website claims "LinkedIn is Illegally Searching Your Computer", and implies the purpose is to find "religious beliefs, political opinions, disabilities".

tl;dr:
- yes, LinkedIn is scanning through a list of 6k+ extensions on Chrome;
- yes, this is bad;
- but the website is disingenuous in making unnecessarily overblown claims.

๐Ÿงต

#LinkedIn #BrowserGate #Privacy

LinkedIn Is Illegally Searching Your Computer

Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedInโ€™s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedInโ€™s servers and to third-party companies including an American-Israeli cybersecurity firm. The user is never asked. Never told. LinkedInโ€™s privacy policy does not mention it. Because LinkedIn knows each userโ€™s real name, employer, and job title, it is not searching anonymous visitors. It is searching identified people at identified companies. Millions of companies. Every day. All over the world.

BrowserGate