A really neat paper on intercepting satellite coms satcom.sysnet.ucsd.edu/docs/dontloo...
16.10.2025 01:16 β π 2 π 0 π¬ 0 π 0@russell-infosec.bsky.social
Security leader & strategist with hands on experience ranging from policy to the pavement. Over the past 15+ years I've tackled the challenges of securing complex technical systems in the constantly changing world of live events. https://russell.computer
A really neat paper on intercepting satellite coms satcom.sysnet.ucsd.edu/docs/dontloo...
16.10.2025 01:16 β π 2 π 0 π¬ 0 π 0I learned so much from the Document Security Alliance meeting! But does the term βQuestion Documentβ give artifact of power vibes to anyone else?
10.10.2025 01:27 β π 0 π 0 π¬ 0 π 0Heading out to DC for a talk at the Document Security Alliance annual meeting! Iβm looking forward to learning more about the state of the art in secure documents. And also sharing what Iβve learned from live events.
09.10.2025 01:22 β π 0 π 0 π¬ 0 π 003 APOCALYPSE NOWISH RECEDIUG RERUITY This Magazine Uses Cookies The Cookies Are Ours. The Choice Is Yours. In Formation values your privacy. We use cookies to customize your print reading journey using our proprietary PaperPusher technology. We can't tell you anything about it, because we value our own privacy more than yours. In addition to your privacy, we also value your private information, including but not limited to your real-time location, sexual preference(s), prescription history, and salty snack choices. We reserve the right to respect, inspect, and judge you and your truth, and to share it with our partners, our partners' partners, and our partners' partners' partners. You are seen. You are so seen. By clicking "Accept All Cookies," you agree to an irrationally exuberant reading experience. By clicking "Accept Essential Cookies Only," you will opt for a more depressive-realist reading experience. By clicking "Customize Settings," you will be provided with the illusion of control. Thank you for getting In Formation. Accept all cookies Accept only Essential cookies Customize By turning this page, I agree to assign all of my assets and medical power of attorney to In Formation, Inc.
βThis magazine uses Cookies.β
βIn Formation values your privacyβ¦ we canβt tell you anything about it, because we value our privacy more than yours.β
βBy turning this page, I agree to assign all of my assets and medical power of attorney to In Formation, Inc.β
π
Finally got back to my longstanding on-again off-again SDR project. Treated myself to a new Raspberry Pi to run it headless and wow, package support and native features are way better than last time I tried anything. Bluetooth headphones just worked! It is finally the year of the Linux Desktop!
27.08.2025 20:10 β π 0 π 0 π¬ 0 π 0This paper is an excellent example of an academic dis track "Replication of Quantum Factorisation Records with an
8-bit Home Computer, an Abacus, and a Dog" - eprint.iacr.org/2025/1237.pdf
If we do the former part right, we wonβt need people to do the latter part. And it is actually hard for users to avoid services that retain metadata. Even assuming those services are accurate in their public statements, parsing them often requires expertise users shouldnβt be required to have.
21.08.2025 21:58 β π 0 π 0 π¬ 0 π 0McDonaldβs security is a soggy fry bucket: plaintext creds, free-food exploits, CEO emails spilling, 64M job apps cracked by β123456.β They fired the whistle, not the bugs. Surveillance clown empire running on duct tape.
20.08.2025 18:34 β π 0 π 1 π¬ 0 π 0New NIST Digital Identity guidelines are out: www.nist.gov/blogs/cybers...
SP 800-63 no longer allows forcing users to change their password just because time has elapsed. Lets see if the insurance underwriters finally update their policies to match...I'm not holding my breath.
Another excellent DEF CON! Iβm excited to keep up with what all you cool people are doing!
11.08.2025 17:17 β π 0 π 0 π¬ 0 π 0Still counts!
10.08.2025 20:33 β π 1 π 0 π¬ 0 π 0If youβre still at DEF CON swing by Track 5 at 2PM, Iβll be giving a fun talk on counterfeiting event credentials & how to get your fake badge into events!
10.08.2025 20:32 β π 0 π 0 π¬ 0 π 0Using ASCII Art as an anti AI Agent technique wonβt last forever, but Iβm going to keep this in my back pocket.
10.08.2025 02:39 β π 1 π 0 π¬ 0 π 0βwhenever Claude logged on, its context would be immediately filled with ASCII pictures of fish (Figure 3), which would then be auto-summarized and given to a new Claude, which would forget that it was trying to log onto a server.β red.anthropic.com/2025/cyber-c...
10.08.2025 02:39 β π 2 π 0 π¬ 1 π 0Interesting that the opinion on AI at DEF CON ranges from βletβs vibe code a SOAR stackβ to βlook at the vulns, so many vulnsβ but absolutely everyone is adjusting to having to deal with gen ai + security one way or the other.
09.08.2025 23:48 β π 0 π 0 π¬ 0 π 0The villages, competitions, and communities are the real treat at DEF CON. Such a great community!
08.08.2025 16:16 β π 1 π 1 π¬ 0 π 0Excited for a bunch of talks at DEF CON today! Iβve been looking for some good mesh networking solutions for event operations applications & RETCON seems like a fascinating solution: info.defcon.org/content/?id=...
08.08.2025 16:16 β π 0 π 0 π¬ 1 π 0the LVCC pre functional area, showing a large digital sign and small crowds of people.
DEF CON vibes are good
07.08.2025 21:01 β π 0 π 0 π¬ 0 π 0Events have a particular business risk from data breaches. Beyond normal customer data, proprietary event data poses a real safety and reputation risk. Unannounced content, operational plans, riders, etc all make it worse.
07.08.2025 14:45 β π 1 π 0 π¬ 0 π 0I'm packing for DEF CON and its so tempting to bring my microscope with me....
06.08.2025 18:29 β π 0 π 0 π¬ 0 π 0I refuse to call voice phishing "vishing" not only does it sound goofy but it is not helpful. Promoting the idea that phishing is channel specific trains users to only pay attention in those channels. But phishing can be whatsappishing, intercomishing, twitchishing, or even coffeeshopishing.
05.08.2025 18:41 β π 2 π 0 π¬ 0 π 0The privacy implications from publicly indexing LLM chats isn't surprising, but people routinely create policy that treats LLM chats like search queries rather than much more private data. The industry needs to reckon with the fact they've pushed users to share deeply. techcrunch.com/2025/07/31/y...
02.08.2025 01:27 β π 0 π 0 π¬ 0 π 0Anyone have of any good examples of LLM code execution vulns that are server-side rather than user-side? As tool use becomes more common we should see more examples of this.
31.07.2025 21:22 β π 0 π 0 π¬ 0 π 0I'm late to the hot takes about Tea, but luckily for me it won't be long until another unsecured S3 bucket dumps a bunch of ID verification photos into the public. Then I'll seem prescient.
30.07.2025 21:23 β π 0 π 0 π¬ 0 π 0This part of the Clorox hacking story is wild to me! Even if the helpdesk had followed their policy, the only information required for a password reset was the manager's name and the user's username. Even the unenforced policy was bad too! arstechnica.com/security/202...
25.07.2025 18:29 β π 0 π 0 π¬ 0 π 0LLMs are the new frontier in unsanitized user input and we're going to see more and more exploits of this.
23.07.2025 18:30 β π 2 π 0 π¬ 0 π 0