https://eshard.com/posts/emulating-ios-14-with-qemu
| Country | Sweden |
| Country | Sweden |
The Electronic Frontier Foundation has released an open source project called Rayhunter. It is designed to run on an inexpensive (~$20) mobile hotspot and look for signs of mobile spying devices called cell-site simulators. Also known as Stingrays or IMSI catchers, they masquerade as legitimate cellphone towers, tricking phones w/in a certain radius into connecting to the device rather than a tower.
https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying

Rayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.
This is your periodic reminder that ambulatory wheelchair users exist. Many folks think wheelchairs are only for those who can't walk at all, or folks who can only take a couple steps.
Wheelchairs and electric scooters are used due to pain, weakness, balance issues, orthostatic intolerance, etc.
#Disability #Wheelchairs #DynamicDisability #ChronicIllness #MEcfs
I just published my writeups for all challenges of #flareon11:
👉 https://blog.washi.dev/posts/flareon11/
👉 https://washi1337.github.io/ctf-writeups/writeups/flare-on/2024/
Hope you like them as much as I liked writing them!
Public disclosure was made today so finally I can talk about how I managed to get full access to the Minut M2 IoT device. There will also be a video series, first episode linked below.
The Minut devices (M3 is their newest, my exploit was for the M2) are most often used by short-term rental hosts and before the vendor released new firmware based in my findings there was a real possibility not only that guests could misbehave without the host knowing about it (the product promise) but also that a guest could persist surveillance of any future guests.
Kudos to Minut for having been excellent to work with and amazingly fast at reacting to my report.
A reminder that Visual Studio Code’s marketplace is still an absolute security clusterfuck that Microsoft have engineered.
There’s active supply chain attacks in there nobody has reported on. (That, yes, will get a cartoon porg blog on one day).
This truly is the darkest timeline.
Well then, it was time to get some new security keys with usb c support anyway..
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/