Sam_Bent's Avatar

Sam_Bent

@doingfedtime.bsky.social

ExDarknet Vendor/Market Admin/Buyer, Author, YouTuber, Paralegal, Hacker, DefCon/SANS speaker, podcaster, OSINT & OPSEC Specialist, and Content Creator

100 Followers  |  5 Following  |  538 Posts  |  Joined: 26.03.2024  |  1.7235

Latest posts by doingfedtime.bsky.social on Bluesky

Post image

I2P floodfill routers use a DHT tuned for anonymity, keeping the network stable and discoverable despite 20โ€“40% of peers changing every hour.

https://www.sambent.com/how-i2p-floodfill-routers-maintain-anonymous-network-databases-under-massive-peer-churn/

13.08.2025 20:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

[Video] Godman666 at Defcon 33: Carding, Sabotage & Survival: A Darknet Market Veteranโ€™s Story

https://www.sambent.com/godman666-at-defcon-33-carding-sabotage-survival-a-darknet-market-veterans-story/

13.08.2025 19:43 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

TLS session resumption can leak information about previously visited sites.
Session ticket encryption keys must be rotated to prevent correlation attacks.

13.08.2025 14:19 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Ethernet frame padding can hide covert data in otherwise legitimate traffic.
Network intrusion detection systems rarely inspect padding bytes.

13.08.2025 12:42 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Fault injection attacks use voltage glitching to skip security checks.
ChipWhisperer tools demonstrate these attacks against common microcontrollers.

13.08.2025 10:05 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

What The Government Really Fears
Every authoritarian regime in history controlled money to control people.
Privacy tools threaten that control.
youtu.be/WN5uOMTGzPc
#FinancialFreedom #CryptoPrivacy #RomanStorm

12.08.2025 21:21 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐—•๐˜‚๐—น๐—น๐—ฒ๐˜๐—ฝ๐—ฟ๐—ผ๐—ผ๐—ณ๐˜€+ ๐—ฑ๐—ฒ๐—น๐—ถ๐˜ƒ๐—ฒ๐—ฟ๐˜€ ๐—น๐—ผ๐—ด๐—ฎ๐—ฟ๐—ถ๐˜๐—ต๐—บ๐—ถ๐—ฐ ๐—ฝ๐—ฟ๐—ผ๐—ผ๐—ณ ๐˜€๐—ถ๐˜‡๐—ฒ๐˜€ ๐—ฎ๐—ป๐—ฑ ๐Ÿฐ๐Ÿฌ% ๐˜ƒ๐—ฒ๐—ฟ๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐˜€๐—ฝ๐—ฒ๐—ฒ๐—ฑ๐˜‚๐—ฝ๐˜€ ๐—ถ๐—ป ๐— ๐—ผ๐—ป๐—ฒ๐—ฟ๐—ผ.

https://www.sambent.com/how-bulletproofs-optimizes-range-proof-computation-and-transforms-monero-transaction-efficiency/

12.08.2025 20:29 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Why do hardware random number generators sometimes fail cryptographic tests?
Von Neumann debiasing can't fix entropy sources with systematic bias.

12.08.2025 14:37 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Cache timing attacks on AES T-tables reveal key schedules through memory access patterns.
Constant-time implementations use bit-slicing to avoid table lookups.

12.08.2025 13:13 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Network time protocol amplification attacks use NTP servers as reflection points.
Monlist command responses can be 200x larger than the triggering request.

12.08.2025 11:28 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Twitter for the Darknet.
No bullshit ID rules apply.
http://pitchprash4aqilfr7sbmuwve3pnkpylqwxjbj2q5o4szcfeea6d27yd.onion/@doingfedtime
or
http://pitchzzzoot5i4cpsblu2d5poifsyixo5r4litxkukstre5lrbjakxid.onion/@doingfedtime

11.08.2025 18:13 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

SMM (System Management Mode) rootkits run in the most privileged CPU mode.
SMRAM protection in newer systems helps but legacy compatibility creates vulnerabilities.

11.08.2025 14:55 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Acoustic cryptanalysis extracts RSA keys from CPU fan noise during computation.
Sound isolation doesn't help when the attack uses electromagnetic emanations.

11.08.2025 12:18 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Intel CET (Control-flow Enforcement Technology) prevents ROP attacks through shadow stacks.
Indirect branch tracking validates call targets but requires compiler support.

11.08.2025 10:41 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Monero uses ring signatures, stealth addresses, and RingCT to provide complete transaction privacy through cryptographic mathematics.
https://www.sambent.com/how-moneros-ring-signatures-provide-true-transaction-privacy/

11.08.2025 10:25 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Which hardware security module bypasses work against TPM chip protection?
Physical access to LPC bus can intercept communication between CPU and TPM.

10.08.2025 14:29 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Covert channels in TCP timestamps can exfiltrate data through timing variations.
Network monitoring tools rarely inspect these subtle timing patterns.

10.08.2025 13:04 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

VLAN hopping exploits switch misconfigurations to access isolated networks.
Double-tagging attacks can bypass basic VLAN security measures.

10.08.2025 11:17 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

How IPFS Mesh Networks Eliminate Server Dependencies Through Cryptographic Content Addressing
www.sambent.com/how-...

09.08.2025 18:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

USB HID injection attacks execute keystrokes faster than humans can type.
Rubber Ducky payloads bypass application-level security controls.

09.08.2025 14:43 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Timing attacks on AES implementations reveal key bits through execution duration.
Constant-time algorithms prevent this but aren't always implemented correctly.

09.08.2025 12:31 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

JTAG ports provide hardware-level debugging access to embedded systems.
These test interfaces often remain enabled in production devices.

09.08.2025 10:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Side-channel attacks measure power consumption to extract cryptographic keys.
Simple power analysis reveals bit patterns in RSA operations.

08.08.2025 14:08 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

NFC payment cards respond to readers from several centimeters away.
RFID skimming works through wallets and clothing without physical contact.

08.08.2025 13:22 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

ECC (Error Correcting Code) memory detects bit flips but can't prevent all attacks.
Targeted bit flips in page tables can escalate privileges.

08.08.2025 11:39 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Bluetooth Low Energy beacons broadcast unique identifiers every few seconds.
Passive scanning builds movement profiles without device pairing.

07.08.2025 14:25 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

ASLR (Address Space Layout Randomization) can be defeated through information leaks.
Return-oriented programming chains adapt to randomized memory layouts.

07.08.2025 12:48 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

CPU speculation attacks like Spectre bypass security boundaries through branch prediction.
Microcode updates slow performance but don't eliminate all attack vectors.

07.08.2025 10:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

They Lost The Technical Battle
When tyrants can't control the technology,
they imprison the technologists.
Same tactic, different century.
youtu.be/WN5uOMTGzPc
#CodeIsFreeSpeech #PrivacyDevelopers #CryptoTrial

06.08.2025 21:21 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Row hammer attacks flip bits in adjacent DRAM rows through repeated access.
Which memory configurations are most vulnerable to this hardware exploit?

06.08.2025 14:51 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@doingfedtime is following 5 prominent accounts