femme β’Ά β“‹ πŸ†“βœ… is a user on mastodon.social. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.

femme β’Ά β“‹ πŸ†“βœ… @femme@mastodon.social

@BryanLunduke You said recently on your show that Wire open sourced their server side and then said that Signal's wasn't, but that's not true. Signal's server side code has been open source for years github.com/WhisperSystems/Sign And as opposed to Wire, Open Whisper Systems does not keep logs (not even for 72 hours, which is what Wire does). Signal is tried and tested whispersystems.org/bigbrother/

Also here's the vaporware remix of my neighbor a cat

( ovo) *spins furiously*
( ov)
( o)
( )
(o )
(vo )
(ovo )
( ovo)
( ov)

I too wish to embrace freedom and decentralization so I can stop 'bad guys' with 'subversive content': mastodon.cloud/users/eileenb/u

:notes: :notes:

"Nowaday they hangin' us by a different tree
Branches of the government, I can name all three
Judicial, legislative and executive"

The new joey bada$$ album is :fire: :fire:

we are the awoo mafia, we're all don masto

queerantagonistic violence Show more

Have you ever wanted to wash your lungs with liquid oxygen?

The leak confirms that four telecoms were targeted: mobilink in pakistan, chinamobile, gabon telecom and telesat sattelite provider. One of the things they look for once inside is "IMEIs that have more than one IMSI associated with it".

A list of the various NSA/Equation Group target URLs that was too long for a toot:

pastebin.com/AKuDv1ZN

Seems like NSA/Equation Group has been on Telesat's satellites since at least 2003:

Linux/bin/tn.spayed:# INTONATION___voyager1.telesat.com.co___66.128.32.68___20030821-014410
Linux/bin/tn.spayed:# INTONATION___enterprise.telesat.com.co___66.128.32.67___20030124-001006

What's this? The US (NSA/Equation Group) was hacking russian government mailservers?

Linux/etc/sha1sums.previous:0AEDC194474DB2F9D0D180A8D8AAAB9B27873D97 Wed Oct 7 14:34:06 2009 [PITCHIMPAIR.12] stoicsurgeon_ctrl__v__1.5.13.5_x86-freebsd-5.3-sassyninja-mail.aprf.gov.ru
Linux/etc/sha1sums.previous:0F357135CBE7BEFAB89397DFC6ABB5C07A968B27 Tue Oct 20 13:28:26 2009 [PITCHIMPAIR.12] stoicsurgeon_ctrl__v__1.5.16.12_x86-freebsd-5.3-sassyninja-mail.aprf.gov.ru

Some targets of by equation group in mission sicklestar:

->10.171.2.50 server-vas-i10.mobilink.net.pk SICKLESTAR (unix)
->10.140.0.40 alien.mobilink.net.pk SICKLESTAR (unix)
->10.211.4.1 CDRCOL1.mobilink.net.pk SICKLESTAR (unix)
->10.140.0.7 lhedc1.mobilink.net.pk SICKLESTAR (windows)
->10.20.20.156 cs02.mobilink.net.pk SICKLESTAR (windows)
->10.20.20.152 fs01.mobilink.net.pk SICKLESTAR (windows)

# ENGLANDBOGY

# local exploit against Xorg for the following versions:
# Xorg X11R7 1.0.1, X11R7 1.0, X11R6 6.9
# Includes the following distributions:
# MandrakeSoft Linux 10.2, Ubuntu 5.0.4, SuSE Linux 10.0,
# RedHat Fedora Core5, MandrakeSoft Linux 2006.0
# Fails-on - Xorg X11R7 1.0.2 and greater and less than Xorg X11R6 6.9.
## Requirements - Target needs to have the Xorg binary as SETUID root.

# Exploits the Xorg X server by allowing unprivileged users load arbitrary modules

The Shadow Brokers - don't read if you hold clearance Show more

Naked Security has a good write up on the Broadcom WiFi SoC vulnerability, and what (little) you can do about it.

nakedsecurity.sophos.com/2017/