@BryanLunduke You said recently on your show that Wire open sourced their server side and then said that Signal's wasn't, but that's not true. Signal's server side code has been open source for years https://github.com/WhisperSystems/Signal-Server And as opposed to Wire, Open Whisper Systems does not keep logs (not even for 72 hours, which is what Wire does). Signal is tried and tested https://whispersystems.org/bigbrother/eastern-virginia-grand-jury/
Also here's the vaporware remix of my neighbor a cat
( ovo) *spins furiously*
( ov)
( o)
( )
(o )
(vo )
(ovo )
( ovo)
( ov)
I too wish to embrace freedom and decentralization so I can stop 'bad guys' with 'subversive content': https://mastodon.cloud/users/eileenb/updates/47989
:notes: :notes:
"Nowaday they hangin' us by a different tree
Branches of the government, I can name all three
Judicial, legislative and executive"
The new joey bada$$ album is :fire: :fire:
we are the awoo mafia, we're all don masto
queerantagonistic violence Show more
Have you ever wanted to wash your lungs with liquid oxygen?
The #EQGRP leak confirms that four telecoms were targeted: mobilink in pakistan, chinamobile, gabon telecom and telesat sattelite provider. One of the things they look for once inside is "IMEIs that have more than one IMSI associated with it".
forgot a few:
A list of the various NSA/Equation Group target URLs that was too long for a toot:
Seems like NSA/Equation Group has been on Telesat's satellites since at least 2003:
Linux/bin/tn.spayed:# INTONATION___voyager1.telesat.com.co___66.128.32.68___20030821-014410
Linux/bin/tn.spayed:# INTONATION___enterprise.telesat.com.co___66.128.32.67___20030124-001006
What's this? The US (NSA/Equation Group) was hacking russian government mailservers?
Linux/etc/sha1sums.previous:0AEDC194474DB2F9D0D180A8D8AAAB9B27873D97 Wed Oct 7 14:34:06 2009 [PITCHIMPAIR.12] stoicsurgeon_ctrl__v__1.5.13.5_x86-freebsd-5.3-sassyninja-mail.aprf.gov.ru
Linux/etc/sha1sums.previous:0F357135CBE7BEFAB89397DFC6ABB5C07A968B27 Tue Oct 20 13:28:26 2009 [PITCHIMPAIR.12] stoicsurgeon_ctrl__v__1.5.16.12_x86-freebsd-5.3-sassyninja-mail.aprf.gov.ru
Some targets of by equation group in mission sicklestar:
->10.171.2.50 server-vas-i10.mobilink.net.pk SICKLESTAR (unix)
->10.140.0.40 alien.mobilink.net.pk SICKLESTAR (unix)
->10.211.4.1 CDRCOL1.mobilink.net.pk SICKLESTAR (unix)
->10.140.0.7 lhedc1.mobilink.net.pk SICKLESTAR (windows)
->10.20.20.156 cs02.mobilink.net.pk SICKLESTAR (windows)
->10.20.20.152 fs01.mobilink.net.pk SICKLESTAR (windows)
# ENGLANDBOGY
# local exploit against Xorg for the following versions:
# Xorg X11R7 1.0.1, X11R7 1.0, X11R6 6.9
# Includes the following distributions:
# MandrakeSoft Linux 10.2, Ubuntu 5.0.4, SuSE Linux 10.0,
# RedHat Fedora Core5, MandrakeSoft Linux 2006.0
# Fails-on - Xorg X11R7 1.0.2 and greater and less than Xorg X11R6 6.9.
## Requirements - Target needs to have the Xorg binary as SETUID root.
# Exploits the Xorg X server by allowing unprivileged users load arbitrary modules
The Shadow Brokers - don't read if you hold clearance Show more
an amazing use of content warnings by @cynicalsecurity https://mastodon.social/media/BGbZGOJ7x3Xc8v6JgI4
Naked Security has a good write up on the Broadcom WiFi SoC vulnerability, and what (little) you can do about it.