Do not admit to committing crimes on the internet.
And also, do not ask people if they will commit crimes in the future on the internet.

Too old to rock and roll, too young to die. Vegan and anarchism curious.
Likes permaculture, infosec, Tranmere Rovers. But mainly bad jokes stolen from https://www.justthetalk.co.uk/thehaven/17468/urgent-i-need-a-good-joke-right-now
Officially not right in the noggin #ʘ‿ʘ
| like | whatever |
| Signal | Tass.02 |
| CO2 ppm at birth | 321.37 |
| AHAHAHAHA |
Do not admit to committing crimes on the internet.
And also, do not ask people if they will commit crimes in the future on the internet.
A thing being repeated across businesses worldwide, including at Microsoft, is C level execs struggling to know why most staff aren’t using Copilot for M365, despite how much it costs.
Because most staff don’t spend all day in Teams meetings reading out PowerPoint slides to people who pretend to care. They have actual jobs. Doing work. Which they know how to do. Because it is their job.
I was in the middle of raking the soil in the greenhouse and just about to top it up with manure, but Hen Pen thought I was preparing her bath 🙄
Really good research from Rapid7 here, where they’ve found multiple new versions of BPFdoor which do things like listen and backdoor on extremely uncommon 4G and 5G signaling protocols - it strongly suggests BPFDoor has been placed far inside telcos for surveillance.
They provide a tool to check for the new implant - I would strongly suggest telcos look for this on their Linux systems, including call infrastructure.
https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/

A months-long investigation by Rapid7 Labs has uncovered evidence of an advanced China-nexus threat actor placing stealthy digital sleeper cells in telecommunications networks, in order to carry out high-level espionage – including against government networks. Read more in a new blog.