13 Followers
63 Following
99 Posts
♡ 1337 h4xX0r that spawned online in 1999
♡ Completely unplugged from The Matrix 🏳️‍🌈💖🏳️‍⚧️


♡ Self-employed Audio Engineer, Music Producer and DJ 🎤📀🔊🪩✨
♡ Bonkers about cats, computers, Fortnite, music, longboarding and DJing 😻
♡ Linux enthusiast and IT/Cybersecurity student, pwning one n00b at a time 👩‍💻📈

sheher
Revolution OShttps://youtu.be/k0RYQVkQmWU?si=iETCv6JOFETbyQ-I
Linus x Linus (Sebastian + Torvalds)https://youtu.be/mfv0V1SxbNA?si=fNU3Qj7yk1-AB_gy
UPDATE: The European Parliament voted today to *end* untargeted mass scanning of private communications, firmly rejecting the error-prone and unconstitutional surveillance practices of recent years! Next: trilogue negotiations w/ Commission and Council.
We were never meant to live like this.

YouTube
🙏✨
when you bruteforce the session cookie and suddenly hit on the admin token

Someday this cat will manage to show off his true talent to the world -

by Chylik (@chiliktol)

🔐 We've rightly treated encryption as a digital safe, assuming that as long as the door is locked, the contents are safe. But we've recently discovered that Microsoft has been providing the FBI with keys to unlock BitLocker-encrypted data. 🤬 It's the "backdoor by design" reality. When recovery keys are automatically synced to the cloud, your vault isn't truly yours—it belongs to anyone with a subpoena and the right API access.

It's the classic tension between convenience and sovereignty. Microsoft’s default practice of backing up recovery keys on its servers is marketed as a safety net for forgetful users. In practice, it creates a centralized master key library for law enforcement. If you aren't managing your own entropy, you aren't actually encrypted; you're just obscured.

🧠 Automatic Sync: BitLocker recovery keys are frequently uploaded to Microsoft accounts by default.
⚡ Legal Access: Law enforcement can bypass local hardware locks by requesting these cloud-stored keys.
🎓 Policy Gap: Most users are unaware that their "disk encryption" has a secondary key held by a third party.
🔍 Privacy Risk: This creates a single point of failure for data sovereignty across millions of devices.

https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/
#DataPrivacy #CyberSecurity #TechTrends #security #privacy #cloud #infosec

Microsoft Gave FBI Keys To Unlock Encrypted Data, Exposing Major Privacy Flaw

The tech giant said providing encryption keys was a standard response to a court order. But companies like Apple and Meta set up their systems so such a privacy violation isn’t possible.

Forbes
As age gates get rolled out, you may find yourself asking: should I continue to use services that require me to verify my age? And if so, how can I do that with the least risk to my personal information? To find out, check out our guide to navigating age assurance tech: https://eff.org/deeplinks/2026/01/so-youve-hit-age-gate-what-now
So, You’ve Hit an Age Gate. What Now?

EFF is against age gating and age verification mandates, and we hope we’ll win in getting existing ones overturned and new ones prevented. But mandates are already in effect, and every day many people are asked to verify their age across the web, despite prominent cases of sensitive data getting leaked in the process.

Electronic Frontier Foundation
#Asahi #Linux on #Apple M1-M5 reverse engineering explained at #39C3 The ultimate goal is to be able to boot any distro 🤩😻 https://youtu.be/3OAiOfCcYFM?si=16KCCYYwFe1ZyqZx
39C3 - Asahi Linux - Porting Linux to Apple Silicon

YouTube
@futurebird Shawty had them apple bottom beans, boots with the fur.. 😻🐾
This is completely bananas, bonkers - insane. In a good way!!! 🤯🤩 #ASML #Veritasium https://youtu.be/MiUHjLxm3V0?si=joLV3mFgQhZxCET5
The Ridiculous Engineering Of The World's Most Important Machine

YouTube