Daniel Roethlisberger

800 Followers
693 Following
365 Posts
security & software engineering · cyber defense · civil society
Websitehttps://daniel.roe.ch
GitHubhttps://github.com/droe

If you're following the situation in Iran, this one is of interest to you.

Today, we're publishing a story that I find very important for many reasons.

We can prove how the regime in Iran is using facial recognition software to surveil its citizens. We have obtained videos showing the software in a live-scenario, at metro stations in Teheran. We have contracts, and we have had a look at the code, built by the Russian company Ntechlab whose algorithms are deemed to be best-in class.

We spoke with a dozen people who know the regime, either because they had to flee after being imprisoned or from a technical point of view.

All of this, and more, you can find in our reporting, #EyesOfIran. Here are the links:

SPIEGEL: https://www.spiegel.de/ausland/iran-so-gnadenlos-spaeht-regime-die-eigene-bevoelkerung-aus-ein-insider-packt-aus-a-7990ef28-3c9d-427b-be9a-5f46d06bea6c?giftToken=7fdb6b96-b2f1-4799-b8ff-e55fed5496d1

Standard: https://www.derstandard.at/story/3000000310751/ein-regime-im-ueberlebensmodus-leak-zeigt-irans-massive-ueberwachung-im-land?ref=niewidget

ZDF: https://www.zdf.de/play/magazine/frontal-das-magazin-100/datenleak-iran-ueberwachung-gesichtserkennung-software-100

Forbidden Stories: https://forbiddenstories.org/iran-regime-monitors-citizens/

Ein Insider packt aus: So gnadenlos späht Irans Regime die eigene Bevölkerung aus

US-Präsident Trump fordert die Iraner auf, das Regime zu stürzen. Doch die Führung in Teheran hat einen gigantischen Überwachungsapparat erschaffen. SPIEGEL-Recherchen gewähren Einblick in das Spähsystem der Mullahs.

DER SPIEGEL
Greece Predator scandal: Four convicted over spyware affair that shook Greece https://www.bbc.com/news/articles/cj6dx4886rpo
Greece Predator scandal: Four convicted over spyware affair that shook Greece

In what became known as "Greece's Watergate", surveillance software called Predator was used to target 87 people.

@censys wrote a blog post about our research into #ResidentBat the Android spyware used by Belarusian KGB. The C2 servers are still online.
https://censys.com/blog/residentbat-belarusian-kgb-android-spyware/

Browser based ES/Mac Monitor log analyzer

- Story timelines
- Sigma rule matching
- In-depth process tree analyzer
- Much much more!

Amazing work by my coworker @txhaflaire.bsky.social

Check it out! https://es.decompiler.dev/

#macos #malware #reverseengineering #threathunting #dfir

Jamf analyzed an iOS Predator implant that disables rendering of the green and orange dots to hide microphone & camera recording by the spyware. It hooks methods inside SpringBoard and mediaserverd. Apple abandoned mediaserverd in iOS 18, and simple user-space hooking shouldn't work on any modern iPhone due to Exclaves. But Forbes now relates that research to iOS 26.2 and 26.3 updates 🤔🤦‍♀️

https://www.jamf.com/blog/predator-spyware-ios-recording-indicator-bypass-analysis/
https://www.forbes.com/sites/kateoflahertyuk/2026/02/20/how-apple-iphone-spyware-can-bypass--orange-and-green-dot-indicators/

How Predator Spyware Defeats iOS Recording Indicators

An analysis documenting how a commercial spyware sample, Predator, operates post-compromise.

My student brought up typed assembly language today, which means I'm obligated to point to this amazing website from the last millennium: https://www.cs.cornell.edu/talc/
Typed Assembly Language

Carelessness versus craftsmanship in cryptography
Two popular AES libraries (aes-js and pyaes) provide dangerous default IVs that lead to key/IV reuse vulnerabilities affecting thousands of projects. One maintainer dismissed the issue, while strongSwan's maintainer exemplified proper security response by comprehensively fixing the vulnerability in their VPN management tool.
https://blog.trailofbits.com/2026/02/18/carelessness-versus-craftsmanship-in-cryptography/
Carelessness versus craftsmanship in cryptography

Two popular AES libraries (aes-js and pyaes) provide dangerous default IVs that lead to key/IV reuse vulnerabilities affecting thousands of projects. One maintainer dismissed the issue, while strongSwan’s maintainer exemplified proper security response by comprehensively fixing the vulnerability in their VPN management tool.

The Trail of Bits Blog

Reminder that Apple is hosting an event on March 5 for developers building software on Apple’s platforms focused on Security.

We're going to present all the technologies that we utilize to make iOS the most secure platform in the world. This is a comprehensive event covering writing security-sensitive components in Swift, Memory Integrity Enforcement (MIE), Pointer Authentication (PAC), hardened allocators, and sandboxing/attack-surface reduction.

Sessions are led by Apple engineers working directly on platform security and security tools.

in-person https://developer.apple.com/events/view/D4MG4S3PJ7/dashboard
online https://developer.apple.com/events/view/TUHA23T82K/dashboard

Meet with Apple - Apple Developer

Join us around the world for a variety of sessions, labs, and workshops — tailored for you.

Apple Developer

Hey All, I made a header only C++ library where it's 1 line of code to init, then you can start writing to pixels on the screen.

I call it thirteen.h, as it is inspired by the simplicity of the 13h days.

Examples include a mandelbrot viewer and a playable mine sweeper game.

MIT licensed.

https://github.com/Atrix256/Thirteen

[RSS] Memory Integrity Enforcement (MIE) on iOS Deep Dive - Part 1 - 8kSec

https://8ksec.io/mie-deep-dive-kernel/
Memory Integrity Enforcement (MIE) on iOS Deep Dive – Part 1 - 8kSec

Introduction In this two-part blog series, we will explore Apple's groundbreaking Memory Integrity Enforcement (MIE) feature. In Part 1, we'll cover the fundamentals: what memory corruption vulnerabilities are, how MIE works at a technical level, and how to analyze the kernel implementation using Binary Ninja. In Part 2, we'll shift to the practical side—enabling MIE

8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.