Reverse engineer and get full root access on the TP-Link Tapo C200 (2025)
https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/
Doing stuff at TurkuSec, DisArray, PersecCamp (hakkerileiri). Volunteering for DisObey.
Threat Intel as a job.
| Site | https://cryptolek.info/ |
Reverse engineer and get full root access on the TP-Link Tapo C200 (2025)
https://quentinkaiser.be/security/2025/07/25/rooting-tapo-c200/
Google, Meta, Microsoft, and Snapchat are launching a counteroffensive to impose chat control on European citizens.
"Today, with the expiration of the ePrivacy exemption that allowed the use of technology to detect child sexual abuse, Europe risks leaving children around the world less protected from the most abhorrent forms of abuse."

Today, because of the expiry of the ePrivacy derogation enabling the use of technology to detect child sexual abuse material (CSAM), Europe risks leaving children across the globe less protected from the most abhorrent harm. This concern is shared by a group of almost 250 child rights organizations and many others.For years, a number of technology companies have taken voluntary action to detect, remove and report CSAM including, where appropriate, through hash-matching technology β a widely utilized tool to prevent and disrupt real, ongoing harm to victims and survivors. This is not just a matter of law, but of protecting children.While EU institutions rightly expect technology companies to take action on child safety, the April 3 expiry of the derogation clouds the legal certainty that has helped responsible platforms try to protect our communities, safeguard child victims, and preserve the integrity of our services. We are disappointed by this irresponsible failure to reach an agreement to maintain established efforts to protect children online.As EU institutions continue to negotiate an immediate, interim solution and durable framework, signatory companies (Google, Meta, Microsoft, and Snap) reaffirm their continued commitment to protecting children and preserving privacy, and will continue to take voluntary action on our relevant Interpersonal Communication Services.We call on EU institutions to conclude negotiations on a regulatory framework as a matter of urgency.To learn more about how hash-matching and CSAM detection tools work, please join this upcoming webinar at 3PM CET on Friday, April 10th.
GaΓ«l Duval is the founder and president of the /e/ foundation along with the CEO of Murena. Duval and his organizations have consistently taken a stance against protecting users from exploits. In this video, he once again claims protecting against exploits is for only useful pedophiles and spies.
Translation to English:
> There's the attack surface, on that front we're not security specialists here, so I couldn't answer you precisely, but from the discussions I've had, it seems that everything
"Bowl for Health", Treasure Island, San Francisco, CA, 2007.
All the pixels, shoe rental not included, at https://www.flickr.com/photos/mattblaze/2123765265
NEW RESEARCH: Yesterday, our team at @DomainTools Investigations published a holistic analysis of DPRK malware tracks and trajectories, providing a cross-connected understanding of the adversarial landscape in Pyongyang.
#infosec #cybersecurity #threatintel
https://dti.domaintools.com/research/dprk-malware-modularity-diversity-and-functional-specialization
Ancient limbs reaching for the Riverland sky.
Loxton, South Australia.
Β© All Rights Reserved by Kev Peirce.
#Photo #Photography #Australia #SouthAustralia #RiverRedGum #LoxtonSA #AustralianNature #RiverLife #SunlitTrees #OutbackBeauty #Tree
An individual, Zhenyun Sun (https://find-and-update.company-information.service.gov.uk/officers/svz68usL11Hfb5q2_65DDqlFd2Y/appointments), is registering UK "fibre ISPs" at Companies House at an unusual rate. On the surface, they could pass for legitimate broadband providers. But look closer, and the picture soon changes π΅οΈ ...
Some of these companies are assigned an ASN, sharing the same abuse contact: onesproxy[.]com. ‡οΈ