286 Followers
1,055 Following
1.3K Posts
Activism and infosec.
"If you’re not living on the edge, you’re taking up too much space."
Big Win for Open Source as Germany Backs Open Document Format

The Deutschland-Stack names ODF and PDF/UA as the only permitted document formats for German public administrations.

It's FOSS
breach.txt is a password wordlist built from real-world passwords found in breaches, forum dumps, leaked logs, and other underground sources. Interesting to check if you’re into password forensics. https://weakpass.com/wordlists/breach.txt #infosec #passwords #breaches

According to the Epstein files, he had a "personal hacker" working for him. The FBI document says Epstein's personal hacker was an "Italian citizen born in Calabria who developed zero-day exploits and offensive cyber tools and sold the tools to governments."

https://www.justice.gov/epstein/files/DataSet%2010/EFTA01683874.pdf

"[Redacted] sold a zero-day to Hebollah. [Redacted] was known as the first person to hack and find vulnerabilities in Blackberries and iOS. He was known for finding Firefox vulnerabilities. [Redacted] former company was acquired by CrowdStrike in fall of 2017 and was currently a vice president there."

"S//NF= was very good at finding vulnerabilities was friends with "old school" European hackers. "Received a trunk of cash from Hezbollah when was in Italy; drove the money to Switzerland and deposited it in another ba [redacted]. [redacted] owned a theater company in California and he used the theater company to launder his zeroday money

"Made six figures from the sale of his zero-days. He sold his tools to United Kingdom GCHQ and provided training to the organization. He also sold his zero-days to a Central African government, as well as Hezbollah for political reasons. The Italian Government asked for help, but [redacted] declined because he felt the Government was incompetent. Calabria was mob-controlled an did not have much loyalty for his birth country.

"[Redacted] sold his exploits to the United States and United Kingdom, but he would not sell to Asian countries because he a is racist. He was also anti-Semitic. [Redacted] was terrified of Russia, however, and would never travel there. He lived in Dubai at one time, and was acquainted with the [redacted] lived in Oman as well. He may have an Iranian and Israeli passport, in addition to his Vatican City passport"

Looks likely the top commenter here is correct about "Epstein's hacker":

https://www.reddit.com/r/cybersecurity/comments/1qsi6ds/informant_told_fbi_that_jeffrey_epstein_had_a/

@tg Id be very interested to try whatever RSS solution you might be working on. I’m an avid user of @brentsimmons NetNewsWire and I will always be grateful for his efforts. But I get the point of “phantom obligation”. Good luck!

Nobody is immune from phishing attacks. Not even Signal users.
Signal has published a good article warning about phishing risks on their platform. Remember to always setup a Signal username instead of sharing your phone number.

https://support.signal.org/hc/en-us/articles/9932566320410-Staying-Safe-from-Phishing-Scams-and-Impersonation

Staying Safe from Phishing, Scams, and Impersonation

We provide a privacy-first, end-to-end encrypted (E2EE) messaging and calling platform designed so only you and your intended recipients can communicate securely. Even with strong encryption, attac...

Signal Support
Using AI to process sensitive files?it happens also to the best (clowns). #US #infosec #AI https://www.politico.com/news/2026/01/27/cisa-madhu-gottumukkala-chatgpt-00749361
Trump’s acting cyber chief uploaded sensitive files into a public version of ChatGPT

The interim director of the Cybersecurity and Infrastructure Security Agency triggered an internal cybersecurity warning with the uploads — and a DHS-level damage assessment.

Politico
Interesting #iPhone #Shortcuts usage: to complement the Apple “Find My” feature, you can create an automation, triggered by a received message, that sends you front/back photos and location of the iPhone. Very useful in case of phone lost or, in some #activism cases, confiscated.
Snow makes for a good #wallpaper

NEW: Meet the folks at AccessNow's Digital Security Helpline, who have been investigating government spyware abuses for more than a decade, helping journalists and dissidents all over the world.

Hassen Selmi, who heads the incident response team, told me his team looks into around 1,000 cases a year. Half of those turn into full investigations, and around 25 result in confirmed spyware infections.

Here’s how Selmi’s team fights spyware abuses.

https://techcrunch.com/2025/12/27/meet-the-team-that-investigates-when-journalists-and-activists-get-hacked-with-government-spyware/

Meet the team that hunts government spyware

For years, Access Now’s Digital Security Helpline has been aiding journalists and dissidents who have been targeted with government spyware. This is how they operate.

TechCrunch

NEW: Apple, Google, and WhatsApp now regularly notify their users if they suspect they have been targeted or hacked with government spyware, such as that made by Intellexa, NSO Group, or Paragon.

Getting one of these can be scary, shocking, and confusing. So we spoke to experts and wrote a guide on what to do, and where to go, if you receive one of those notifications.

https://techcrunch.com/2025/12/29/youve-been-targeted-by-government-spyware-now-what/

You've been targeted by government spyware. Now what? | TechCrunch

Tech companies are increasingly warning their customers that they have been targeted by governments with advanced government spyware, such as NSO's Pegasus or Paragon's Graphite. What happens after receiving a threat notification?

TechCrunch