@BryanLunduke@mastodon.rocks You said recently on your show that Wire open sourced their server side and then said that Signal's wasn't, but that's not true. Signal's server side code has been open source for years https://github.com/WhisperSystems/Signal-Server And as opposed to Wire, Open Whisper Systems does not keep logs (not even for 72 hours, which is what Wire does). Signal is tried and tested https://whispersystems.org/bigbrother/eastern-virginia-grand-jury/
I too wish to embrace freedom and decentralization so I can stop 'bad guys' with 'subversive content': https://mastodon.cloud/users/eileenb/updates/47989
The #EQGRP leak confirms that four telecoms were targeted: mobilink in pakistan, chinamobile, gabon telecom and telesat sattelite provider. One of the things they look for once inside is "IMEIs that have more than one IMSI associated with it".
A list of the various NSA/Equation Group target URLs that was too long for a toot:
What's this? The US (NSA/Equation Group) was hacking russian government mailservers?
Linux/etc/sha1sums.previous:0AEDC194474DB2F9D0D180A8D8AAAB9B27873D97 Wed Oct 7 14:34:06 2009 [PITCHIMPAIR.12] stoicsurgeon_ctrl__v__22.214.171.124_x86-freebsd-5.3-sassyninja-mail.aprf.gov.ru
Linux/etc/sha1sums.previous:0F357135CBE7BEFAB89397DFC6ABB5C07A968B27 Tue Oct 20 13:28:26 2009 [PITCHIMPAIR.12] stoicsurgeon_ctrl__v__126.96.36.199_x86-freebsd-5.3-sassyninja-mail.aprf.gov.ru
Some targets of by equation group in mission sicklestar:
->10.171.2.50 server-vas-i10.mobilink.net.pk SICKLESTAR (unix)
->10.140.0.40 alien.mobilink.net.pk SICKLESTAR (unix)
->10.211.4.1 CDRCOL1.mobilink.net.pk SICKLESTAR (unix)
->10.140.0.7 lhedc1.mobilink.net.pk SICKLESTAR (windows)
->10.20.20.156 cs02.mobilink.net.pk SICKLESTAR (windows)
->10.20.20.152 fs01.mobilink.net.pk SICKLESTAR (windows)
# local exploit against Xorg for the following versions:
# Xorg X11R7 1.0.1, X11R7 1.0, X11R6 6.9
# Includes the following distributions:
# MandrakeSoft Linux 10.2, Ubuntu 5.0.4, SuSE Linux 10.0,
# RedHat Fedora Core5, MandrakeSoft Linux 2006.0
# Fails-on - Xorg X11R7 1.0.2 and greater and less than Xorg X11R6 6.9.
## Requirements - Target needs to have the Xorg binary as SETUID root.
# Exploits the Xorg X server by allowing unprivileged users load arbitrary modules
The Shadow Brokers - don't read if you hold clearance
Just in case you missed it: The Shadow Brokers has published a rant and the password for their tool dump.
Password for c&p is:
Files, for those needing them, at:
(thanks to @kript3ia for reminding me)
Naked Security has a good write up on the Broadcom WiFi SoC vulnerability, and what (little) you can do about it.
live communism, spread anarchy
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!