Choc Chip Camo Pants๐Ÿ“ถ

50 Followers
83 Following
214 Posts

You are as private as your most public statement; as secure as your worst oversight.

Mission: Making sure the wheels don't fall off the bus as it thunders (or limps) down the information superhighway.

(๐Ÿฆ @chocchipsec;
AKA @realcainmosni,
๐Ÿฆ @[email protected])

And they shall know him by his trousers.

GitHubhttps://github.com/camopants

If you're on LinkedIn and are thinking about verifying your account with them, maybe read this first. It walks through LinkedIn's privacy disclosure to identify 17 companies that may receive and process the data you submit, including name, passport photo, selfie, facial geometry, NFC data chip, national ID #, DoB, email, phone number, address, IP address, device type, MAC address, language, geolocation etc. Unsurprisingly, it seems the biggest recipients are US-based AI companies.

https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/

A phishing email.

A not very sophisticated phishing attempt, but sometimes simplicity wins. I received this to one of my personal email boxes on my personal domain.

A simple construction of email to the domain.

The link off-site went to a very simple self-constructing site that would have used an external resource (image.thum.io) to capture a root window snapshot image of the site to place under the "login" box. The email address was in the GET parameters (and the displayed company name inferred, very simplistically, from the domain part).

Absolutely not enough to catch me out, but someone less fastidious? In these times of economic stress for many, a message like this is going to raise the stress even more, and play on emotional cues (fodder to the con artist).

It's easy to say "ah, but that's so obviously a phish I wouldn't fall for it". I have news for you - scammers don't care how often they fail and YOU are not the target. The busy person at the bottom of the food chain, who may not be quite so observant or fastidious, is.

It behoves us to make everyone in every organisation aware of the risks.

The question people often ask is "Why me?" The answer is simple: because they can. Because you are there. Because any foot in the door is a start. The attacker can investigate what facilities and people they have access to. Maybe nothing. Maybe something. And at least they might have access to an email account they can use. Ingres - Investigate - Pivot.

PS: apologies to anyone offended by the test email address I chose to use, but I wasn't going to validate their records with my own.

RE: https://mastodon.online/@mullvadnet/116087059413472819

I'm really not keen on this "papers, please" Internet environment that the UK is rapidly deploying.

bleepingcomputer blocking TOR access. Helpful...
London Linux Drinks: February, "Don't Worry; It Will Soon be Spring" Edition, Wed, Feb 25, 2026, 7:00 PM | Meetup

January will be behind us, and Valentines, and most of possibly the coldest month of the year, so what comes next? Come meet like-minded people, with a common interest in L

Meetup

[edit] February's [/edit] DC4420, Tuesday next week.

See https://dc4420.org/

The Greene Man
383 Euston Road
London NW1 3AU

Nearest Tube: Great Portland Street. (Regents Park and Warren Street both short walks away; Euston Square and Euston a brisk 10 minutes.)

DC4420

DC4420 - DEF CON London

RE: https://hachyderm.io/@jdblair/115609917863140498

๐Ÿคฆ๐Ÿพโ€โ™‚๏ธ๐Ÿคฃ

Qualified and licenced workers are unemployed and homeless on the streets. Meanwhile one man is deluded enough to think he has the right to expect to be paid a trillion dollars a year.

Funny ol' world, innit?

meetup.com really has gone to shit, hasn't it? Piles of totally irrelevant "recommendations", which it so happens are mostly waiting-list only, and guess what: access to the waitlist is a subscription service. Unfortunately, whilst I don't have any interest in any of their fluffy, happy-clappy social recommendations (made, I should point out, to my "professional" account), one of the industry events I am interested in is also wait list only, but I am not stumping up for the privilege of "maybe".
From @krebs_on_security_feed https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-packages/ Credential stealing "Sha-Hulud" NPM worm got a leg-up when it infected CrowdStrike packages.
Self-Replicating Worm Hits 180+ Software Packages โ€“ Krebs on Security