Sam Bent

@doingfedtime
129 Followers
5 Following
793 Posts

I am Sam Bent. In this unique space, technology meets #security, #privacy intersects with the digital underworld, and the complexities of networks like #Tor, #I2P, and other overlay networks are unraveled. My journey has taken me from the depths of the #Darknet and #darkweb.

As an ExDarknet Vendor/Market Admin/Buyer, Author, #YouTuber, Paralegal, Hacker, DefCon/SANS speaker, podcaster, #OSINT & #OPSEC Specialist, and Content Creator, my content spans a wide array of topics.

YouTube Channlehttps://www.youtube.com/@Sam_Bent
My Sitehttps://www.doingfedtime.com
Twitter/Xhttps://twitter.com/DoingFedTime
Keybasehttps://keybase.io/doingfedtime
tuxsudo (@tuxpizza) on X

๐Ÿ‡บ๐Ÿ‡ฒ America First โ˜ฆ๏ธ Christ is King ๐Ÿฐ @monero & @cakewallet enjoyer

X (formerly Twitter)

Maybe you need a Monaro...

Video by Tuxsudo

The Somalis committed fraud.
The government committed taxation.
Both hate you and feed off you.
One is being investigated.
Trusting the extortionist to catch the fraudster is insane.

Side-channel attacks on SSH through keystroke timing analysis.

"We show that timing data alone can be used to extract passwords from SSH connections."

- ๐—ง๐—ถ๐—บ๐—ถ๐—ป๐—ด ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜€๐—ถ๐˜€ ๐—ผ๐—ณ ๐—ž๐—ฒ๐˜†๐˜€๐˜๐—ฟ๐—ผ๐—ธ๐—ฒ๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ง๐—ถ๐—บ๐—ถ๐—ป๐—ด ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ ๐—ผ๐—ป ๐—ฆ๐—ฆ๐—› by Dawn Song, David Wagner, and Xuqing Tian (2001)
https://people.eecs.berkeley.edu/~daw/papers/ssh-use01.pdf

Hiding 53.5 kilograms of cocaine in a vehicle's exhaust system worked exactly as well as
anyone with basic OPSEC knowledge would expect Revenue officers found it in minutes.

https://www.sambent.com/up-in-smoke-how-x-rays-burned-a-eu3-75m-cocaine-run

GNUnet 0.26.2: Post-Quantum Layer and UTF-8 API Fixes

GNUnet 0.26.2 shipped December 22, 2025 with two targeted bugfixes: NULL reporting in the post-quantum cryptography layer and UTF-8 case conversion API repair.

Sam Bent
GNUnet 0.26.2 shipped December 22, 2025 with two targeted bugfixes:
NULL reporting in the post-quantum cryptography layer and UTF-8 case conversion API repair.
He runs year-round surveillance on minors,
maintains a behavioral database with no consent mechanism,
and conducts 2 billion warrantless entries annually.
The conspiracy is thinking he's NOT a three-letter asset.
(Merry Christmas Eve everyone :) )
[article] Every Tor circuit travels through exactly three relays,
but the algorithm selecting those relays determines whether
your traffic stays anonymous or gets correlated.
https://sambent.com/how-tor-circuits-actually-work-under-the-hood-2
Day 38 of 40
National Security Letter Gag Orders (2001-present)
18 U.S.C. ยง 2709(c) prohibits companies from disclosing they received an NSL. Permanent gag orders mean you'll never know FBI demanded your records.
Nicholas Merrill fought his gag order for six years before a court let him identify himself.
Thousands of other recipients still can't speak.
First Amendment protects speech. NSL gag orders criminalize telling anyone the government is investigating you.