Show more

Poll:

Compared to your ISP, do you trust darknet nodes... ?

This sounds pretty awesome. Or terrifying.

//

Ciphey is an automated decryption tool. Input encrypted text, get the decrypted text back.

"What type of encryption?"

That's the point. You don't know, you just know it's possibly encrypted. Ciphey will figure it out for you.
Ciphey can solve most things in 3 seconds or less.

github.com/Ciphey/Ciphey

The U.S. National Security Agency (NSA) today has published guidance on how to expose as little location information as possible while using mobile and IoT devices, social media, and mobile apps.

bleepingcomputer.com/news/secu

This has been a problem with Tor for a while now, and it appears to be getting worse. It is the main reason I don't feel any safer using it.

//

How Malicious Tor Relays are Exploiting Users in 2020 (Part I)

>23% of the Tor network’s exit capacity has been attacking Tor users

medium.com/@nusenu/how-malicio

Here is a thorough analysis of what user data TikTok is sending back. It's less than you might think.

//

TikTok: Logs, Logs, Logs. We are in 2020 and the US president is… | by Elliot Alderson | Aug, 2020 | Medium

medium.com/@fs0c131y/tiktok-lo

I use Bitwarden, and I am not very enthused by this news. Biometrics are not as secure as a strong password with 2FA, especially face ID. A password vault should have the strongest protection you have available.

I suppose it's better than someone using a weak password or PIN, but there's no way I'd use this feature.

//

Say Hello to Windows Hello and Touch ID in the Bitwarden Desktop App | Bitwarden Blog

bitwarden.com/blog/post/introd

🔥 🔥

Keep your eyes open for this one. No modified hardware required.

//

BadPower attack corrupts fast chargers to melt or set your device on fire

Attackers can alter the firmware of fast charger devices to deliver extra voltage and damage connected equipment.

zdnet.com/article/badpower-att

I won't link it here, but Brian Krebs is once again doxxing individuals who he believes are responsible for the recent Twitter compromise.

Way to make it harder for law enforcement to do their jobs, and to potentially ruin people's lives if you're wrong (or their families' lives even if you're right).

This is why I no longer respect Brian Krebs.

It doesn't matter how good your password and MFA game is, if you are careless with what you post on social media.

twitter.com/donie/status/12835

🚨 🚨
Hackers Are Breaking Directly Into Telecom Companies to Take Over Customer Phone Numbers

SIM swappers have escalated from bribing employees to using remote desktop software to get direct access to internal T-Mobile, AT&T, and Sprint tools.

vice.com/en_us/article/5dmbjx/

"Hackers used social engineering to target some of Twitter’s employees and then gained access to the high-profile accounts."

AP News: Experts say Twitter breach troubling, undermines trust

apnews.com/7f8907e7f9c46ecb044

Twitter Is Removing Images of Internal Tool Sources Say Enables Account Takeover

Multiple screenshots obtained by Motherboard show an internal panel that are being shared in the underground after a wave of account takeovers.

vice.com/en_us/article/jgxd3d/

Show more

ᏤⵁŁ₮ƦⵁИł€

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.