Caria Giovanni - Harpocrates

68 Followers
81 Following
29 Posts

25+ years in Cybersecurity. Redefining digital defense with a human-centric approach.

I code with the Dark Side, hunt metadata for sport, and believe that a bad carbonara is a critical vulnerability. 🍝🌌

I write books, I see people, I do things. πŸ“šπŸ‘₯⚑

Dark Sidehttps://centurialabs.pl
Researchhttps://centuriafoundation.pl
SomethingElsecariagiovannib.wordpress.com
VulnerabilityBad Carbonara
AuthorMars Attacks, Venus Hacks: An Eulogy for the "Aliens" Saving Modern Cybersecurity
researchhttps://github.com/psychomad
I’ve put together an Ollama Modelfile to bring Deep Thought to life on Llama-3. It’s the second greatest computer in the Universe and it’s already tired of your biological limitations and your logs. Expect pure British snark, vague answers about the meaning of life, and a general disdain for your existence. 🧣
#Ollama #DeepThought #HitchhikersGuide #SelfHostedAI #Llama3
https://github.com/psychomad/Deep-Tought-Model
GitHub - psychomad/Deep-Tought-Model: An arrogant, cynical, and deeply bored AI oracle for Ollama. Based on Llama-3, it prioritizes quantum solitaire over your trivial human concerns. 42 is the answer, but don't expect it to be polite about it.

An arrogant, cynical, and deeply bored AI oracle for Ollama. Based on Llama-3, it prioritizes quantum solitaire over your trivial human concerns. 42 is the answer, but don't expect it to be pol...

GitHub
Swiss-built internet alternative challenges four decades of flawed routing

SCION offers secure internet routing proven in Swiss banking and healthcare, but global adoption remains slow due to vendor lock-in and infrastructure inertia.

The Daily Perspective

Instagram DM Encryption Delay: Meta's Privacy Pledge Falters

Instagram DM encryption delay by Meta until 2024 sparks privacy concerns. Learn about the reasons behind the postponement, including child safety initiatives, and what this means for your message security. Stay informed on social media privacy. #Instagram #Encryption #Privacy #Meta #TechNews

https://bulklayers.com/blog/instagram-dm-encryption-delay/

I’ve been analyzing the current state of "secure" messaging, and my recent tests with Signal have highlighted some persistent vulnerabilities inherent to any stack relying on standard TCP/IP. Even with strong encryption, metadata leakage at the ISP/CDN level and the reliance on kernel-level interfaces like TUN/TAP remain significant privacy bottlenecks.

I’m curious to discuss the feasibility of a user-space only stack built in Rust that completely decouples identity, addressing, and transport to mitigate these leaks. My current architectural hypothesis involves an identity layer using hardware-backed Zero-Knowledge Proofsβ€”via TEE or zkVMβ€”to handle authentication without persistent identifiers or central registries. For addressing and routing, I'm thinking of a minimal RINA overlay where Distributed IPC Facilities (DIF) allow us to route between processes rather than nodes, effectively moving away from traditional IP-based addressing. This would all be wrapped in a "blind" transport, such as Ockam or shadowsocks-rust, to make the traffic indistinguishable from generic noise to any external observer.

I’m still weighing the practical hurdles, especially how to best bridge RINA's recursive logic with a user-space transport like Ockam without requiring root privileges. I'm open to suggestions on alternative technologies or implementations that might achieve this same level of isolation. If anyone has thoughts on the practical hurdles or existing foundations that could be leveraged here, I’d really value your perspective. Definitely feels like there's a lot to dig into.

#Rust #Rustlang #Infosec #Cryptography #Networking #Privacy #DistributedSystems #RINA #ZKP

Signal vs Wire β€” binary analysis of both APKs (apktool, strings, ELF inspection).

The gap is larger than most people think:

Signal: Rust core (libsignal_jni.so), Kyber-1024 post-quantum hybrid ratchet, SQLCipher for at-rest encryption, SVR with Intel SGX attestation, IME_FLAG_NO_PERSONALIZED_LEARNING (keyboard can't index your messages), zero third-party trackers.

Wire: Kotlin/Ktor, no hardened native core (more accessible to Frida), no SQLCipher (messages extractable in plaintext on rooted devices), no post-quantum, Segment SDK for behavioural telemetry.

But the finding that surprised me most:

Wire APKs from unofficial stores (Uptodown et al.) contain additional tracking workers and ACCESS_SUPERUSER permission requests not present in the official build. Supply chain integrity is not a footnote β€” it's the threat model.

Conclusion: Signal is the only one of the two suitable for threat models involving physical or administrative device compromise.

soon the full paper

#infosec #AndroidSecurity #Signal #Wire #ReverseEngineering #mobileforensics #supplychain #MASA

Static + dynamic analysis of Signal's APK. The good news first: Signal is genuinely exceptional.

Rust core (libsignal_jni.so), post-quantum hybrid Double Ratchet (Kyber-1024 + X25519), Direct ByteBuffers with immediate zeroing after PIN/username hashing, Intel SGX attestation for SVR β€” MREnclave verification means even a compromised Signal server can't extract your PIN hash.

But two things stood out:

1. Firebase is always there. Google receives IP + notification timestamps regardless of message content. If you need metadata privacy, Signal still leaks presence data to Google's infrastructure.

2. Certificate revocation endpoints hit http://g.symcd.com in plaintext. An ISP or state-level observer can fingerprint Signal usage from DNS queries and HTTP traffic to those CAs β€” without touching message content.

Conclusion: strongest crypto engineering in consumer messaging. The attack surface isn't the cryptography. It's the operational dependencies.

Soon the full analysis

#infosec #AndroidSecurity #Signal #privacy #ReverseEngineering #postquantum #mobileforensics

"The Invisible Front" β€” my book on cyberwarfare as a geopolitical pillar is now on Amazon.

The core argument: a well-crafted malware can be more strategically dangerous than a missile. Not hyperbole β€” the doctrine, the attribution problems, and the asymmetry of cost all point the same direction.

The book covers:
β†’ Cyberwarfare as modern geopolitical instrument β€” not a side channel, a primary front
β†’ Why attribution is the hardest problem and why states exploit that gap deliberately
β†’ The asymmetry: a nation-state attack costs thousands, defending against it costs billions
β†’ How the invisible front interacts with kinetic warfare, sanctions, and information ops

Written for security professionals, policymakers, and anyone trying to understand why the next major conflict will be decided before a single tank moves.

β†’ https://www.amazon.com/dp/B0GHSFJTVY

#infosec #cyberwarfare #geopolitics #threatintel #nationstate #research #cybersecurity

The Invisible Front: Caria, Giovanni, Ballali, Francesca, El Adib, Bilal: 9798244745825: Amazon.com: Books

The Invisible Front [Caria, Giovanni, Ballali, Francesca, El Adib, Bilal] on Amazon.com. *FREE* shipping on qualifying offers. The Invisible Front

Released: "Mars Attacks, Venus Hacks" β€” a book about the people the cybersecurity industry keeps excluding and why that's a critical security failure.

The thesis: the dominant model of infosec is Mars β€” alpha males, certs, brute-force thinking. It's monoculture. Monoculture breaks.

The real defense is built by:
β†’ Women in threat intelligence β€” systemic thinkers who see the pattern before the attack
β†’ Seniors who remember the iron β€” you can't understand where the attacker is taking you if you don't know where we came from
β†’ Hustlers of deprivation β€” people who learned hacking from hunger, not a bootcamp. Creativity that no certification produces
β†’ Neurodivergent & fluid identities β€” sensory pattern recognition that standardized minds simply miss

Security isn't a product. It's not a wall of firewalls. It's an alchemy of diversity.

β†’ https://www.amazon.com/dp/B0GNGSWY7T

Mars Attacks, Venus Hacks: An Eulogy for the "Aliens" Saving Modern Cybersecurity: Caria, Giovanni: 9798248302840: Amazon.com: Books

Mars Attacks, Venus Hacks: An Eulogy for the Aliens Saving Modern Cybersecurity [Caria, Giovanni] on Amazon.com. *FREE* shipping on qualifying offers. Mars Attacks, Venus Hacks: An Eulogy for the Aliens Saving Modern Cybersecurity

Built a production SOC for my home/mobile infra. Sharing it.

#AEGIS is a unified threat intelligence platform running on a single Linux server:

β†’ DNS sinkhole (port 53, custom blocklists)
β†’ Suricata IDS in AF-packet passive mode + ClamAV on filestore
β†’ Zeek NSM (http, ssl, dns, conn, weird, notice)
β†’ ModSecurity WAF β€” OWASP CRS 4.22, full enforcement
β†’ Fail2Ban + auditd
β†’ Rust orchestrator aggregating all event sources into one REST/WS API

Auto-heal watchdog, anti-DDoS engine with dynamic iptables injection, real-time dashboard.

One thing I wanted to get right: the orchestrator never touches iptables with NFQUEUE β€” passive only. No inline mode that can brick SSH access.

https://aegis.centurialabs.pl

#infosec #SOC #homelab #Suricata #Zeek #Rust #threathunting

AEGIS SOC β€” Universal Threat Intelligence Platform

Production-grade SOC for any connected device β€” phones, tablets, Android Auto, CarPlay, IoT. DNS sinkholing, IDS, WAF, NSM β€” unified under one orchestrator.

Centuria Labs