Today we'll go behind the scenes of one of the most beloved and successful #hacker cons, with the husband and wife team who ran it for 20 years, from the Snowpocalypse to Shmoo balls and the chandelier shard miracle.
https://podcast.firewallsdontstopdragons.com/2025/06/23/shmoocon-moose-you-already/
@dvandal @strlcat @davidgerard
Wayland and systemd are both symptoms of the same behaviour, as was PulseAudio:
And that's the kind of thing that you can only get away with if you're able to act as a monopoly, by employing maintainers at key points across the ecosystem.
The biggest problem with Microsoft was not that their monopoly allowed them to be evil, it was that it allowed them to be stupid. A lot of things in the MS ecosystem are actually bad for Microsoft, but they're pushed out because no one inside MS cares enough to do the right thing and no one outside is able to fix the problems. I, personally, don't want the F/OSS OS ecosystem to end up like that.
Analysis
This is not a complete failure analysis. This are only my observations. A full detailed analysis is most likely to be even more shocking.
Failures:
Impact
It can be safely assumed (due to duration and easiness to discover) that all data on those shares is now in the hands of inttelligence services with non-friendly attitude towards the United States of America (e.g. Russia, China)
3/4
Timeline
**Update 3:** You can find my PostMortem here: https://infosec.exchange/@masek/114721620930871030 **Update 2:** As far as I can tell, the servers that caused the leak belonged to the DOJ in Montana. We reached them in two ways: - Through this post we got contact to the vendor of the software. With the Serial# (in the extraction reports) they could identify whom to call. - A friend had a contact in one of the affected police department and they reached out to the DOJ. Thanks to this community I was also able to get a contact within the FBI. Furthermore some media contacted me and a lot of Mastodon users provided me with additional contacts. Event though I contacted the AG in Monatana and one PD, no one has reached out to me from the DOJ side. **Update 1:** Leak is closed. Will write more tomorrow. Thank you to everyone who helped. **Phone forensics** Usually law enforcement is very secretive about them analyzing the phones of suspects. But a forensic lab in #montana is extremely transparent about it. They put the dump of every phone on a public share. Everyone with Internet access can access those dumps. While I am usually a proponent of government transparency, this takes it a bit too far even for my taste. Every phone dump is one directory and some case names can be easily connected to crime & death headline news in the U.S. So for one case I am pretty sure, that I can even say which Sheriff is responsible for that one of the investigations. I sent that Sheriff an email, i sent him a text message and I even spoke on his voicebox. I even sent him the extraction report from Graykey. It is really frustrating that I get no response at all. The leak is still open. The security researcher that found the leak also tried some contacts but had as little success as I do. I personally believe that this leaks even constitutes a federal crime. Some cases have names ending on CSAM. The security researcher stayed away from any of those and I did not access the files on that server at all. So does anybody know someone within the #fbi that would give a shit about that. I am getting very tired. #graykey #cellebrite #forensics
PostMortem: Assumed DOJ Montana Leak of Phone Dumps
Type of leak
Highly confidential information on a public SMB share without authentication
Threats from the leak
I see the following threats:
1/4