norecognition.org
#AI #Privacy #CyberSecurity #ComputerVision #AdversarialML
@hevnsnt.bsky.social
Nationstate Cybersecurity: OG #SecKC #KansasCity haKCer, custom hardware dev, nano user, python advocate, & #23isreal. I forked ur Github to steal ur codez #. Current IP Address: 0.0.0.0
norecognition.org
#AI #Privacy #CyberSecurity #ComputerVision #AdversarialML
I am pausing the network today to work on Client 1.0 to move beyond generic CV targeting. The new client is re-engineered to stress-test the specific AI architectures used in law enforcement body cams, military surveillance, and commercial security systems.
18.11.2025 15:16 — 👍 0 🔁 0 💬 1 📌 0We effectively found 73 ways to disappear from computer vision.
18.11.2025 15:16 — 👍 0 🔁 0 💬 1 📌 0
In just two weeks, the network ran 7.6 million tests. We didn't just find noise; we found the signal:
276,200 Anomalies identified.
73 "Extreme" Anomalies that successfully bypassed BOTH person detection ("Is there a human?") and face detection ("Is there a face?") simultaneously.
What if the pattern on your hoodie, scarf, or shirt could disrupt the cameras watching you? I built a distributed system to attack facial recognition. We just wrapped up the private beta, and the results were groundbreaking.
18.11.2025 15:16 — 👍 2 🔁 0 💬 1 📌 0the correct email is bill@seckc.org (oops!)
10.11.2025 17:11 — 👍 0 🔁 0 💬 0 📌 0
The code will be fully open source for you to review.
Interested? Email me at bill@seckc.orgto with your github user name so I can add you to the repository.
* Document the setup process.
* Report any issues or confusing steps.
* Help me streamline onboarding before the public release.
(Focused only setup feedback!)
Requirements to Join:
* You must have a GitHub account.
* You must have a Google account that you are willing to connect to the project).
I'm opening a private beta for the norecognition distributed client, which finds patterns that break AI facial recognition (see norecognition.org for more info).
I need your help to test the setup and on-boarding process
I built a system that attacks facial recognition. It generates and tests millions of visual patterns to see which ones break facial detection and recognition.
Limited Beta Test: noRecognition Distributed Client.
What if the pattern on your hoodie, scarf, or shirt could disrupt the cameras watching you? I’m finally ready to talk about something I’ve been building quietly for the past month.
10.11.2025 17:01 — 👍 1 🔁 0 💬 1 📌 0
Super special thanks to our Sponsors:
Cisco @cisco.com
SOFTwarfare
Palo Alto @paloaltonetworks.bsky.social
Without our sponsors, we couldn't continue to put on such bangin events!🙏
This is the @sec_kc meeting you tell your friends about. Seats are limited (and FREE!) and this lineup won’t wait around. Grab your spot now and get ready for the kind of night you’ll be bragging about for months.
www.seckc.org/upcoming-eve...
Then legendary #hacker Neil Wyler, aka @grifter801.bsky.social, grabs the stage to tell his origin story. He is walking hacker lore and his #SecKC headliner talk will trace every step of that wild ride.
02.07.2025 16:06 — 👍 0 🔁 0 💬 1 📌 0Joe Marshall @immortanjo3.bsky.social from Cisco Talos will pull back the curtain on the real world of cyber threats. We are talking Ukraine battlefield war stories, live intel from one of the top security teams on Earth, and zero B.S. insights you won’t catch on any webinar.
02.07.2025 16:06 — 👍 1 🔁 0 💬 1 📌 1EVERYONE #SecKC is one week away and this one is a straight 🧨🧨firework🧨🧨 show. We’ve locked in two absolute legends who will blow the roof off any idea you have about a typical meetup:
02.07.2025 16:06 — 👍 1 🔁 0 💬 1 📌 0
A big THANK YOU to @d0rkph0enix.bsky.social @hevnsnt.bsky.social and the entire #SecKC crew for the hospitality and for having me speak last night.
It was also very cool to see @joegrand.bsky.social and his microcontroller glitching.
Good to see @jotunvillur.bsky.social and several others as well!
TODAY IS THE DAY!
10.06.2025 16:44 — 👍 3 🔁 0 💬 0 📌 0
KC hackers: @SecKC moves to Knuckleheads Garage on June 10 with hardware legend @joegrand.bsky.social Joe “Kingpin” Grand & OT security expert @chrissistrunk.bsky.social Chris Sistrunk. Don’t miss this hacker showcase! RSVP: seckc.org/upcoming-events/seckc-june-2025
#SecKC #KCtech #hacking #Defcon
Oh wow. This just in from a CISA spokesperson:
“The CVE Program is invaluable to cyber community and a priority of CISA. Last night, CISA executed the option period on the contract to ensure there will be no lapse in critical CVE services. We appreciate our partners’ and stakeholders’ patience.”
Hi its me, please do not add me to any more signal group chats. I can barely keep up with the ones I am already in.
25.03.2025 14:41 — 👍 0 🔁 0 💬 0 📌 0Flyer for the Phrack 40th anniversary edition CFP. It contains the text of the CFP at phrack.org, with additional text "CFP EXTEND!! Papers due June 15 2025" and "Phrack Since 1985"
We heard you needed some more time, so we wanted to let you cook.
We decided to push the Phrack 72 CFP deadline back until June 15th.
Stay tuned for upcoming Phrack events.
Print this flyer out and give it to someone IRL!!
🚨 BIG NEWS! 🚨 @haxorthematrix.bsky.social
and I were accepted to to #Shmoocon! We are bringing the #CYA - Cover Your Ass - A cheap BLE Tracker Analyzer! It’s so cheap, you’ll think it runs on Colt45🍺 Come for the DIY BLE-Hunting Fun, stay for punny fun! 🕵️♂️💛 It’s time to #CYA
There were a TON of good stories this week, please check the show notes for all the stories from all the hosts!
securityweekly.com/psw-852
news.mit.edu/2024/mit-tui...
Newly expanded financial aid will cover tuition costs for admitted students from 80 percent of U.S. families.
www.cnn.com/2024/11/18/e...
👀Two undersea internet cables in the Baltic Sea have been suddenly disrupted, according to local telecommunications companies, amid fresh warnings of possible Russian interference with global undersea infrastructure.
www.tryparity.com/blog/how-met...
In this article, engineers outline how they leveraged large language models to improve Meta's incident response capabilities. The headline metric from this report: Meta was able to use LLMs to successfully root cause incidents with 42% accuracy in their web monorepo
firehose3d.theo.io
The BlueSky (I am hevnsnt.bsky.social btw) firehose in a Window95'ish looking interface.
techcrunch.com/2024/11/19/s...
Microsoft plans to let Teams users clone their voices so they can have their sound-alikes speak to others in meetings in different languages. What could possibly go wrong?
github.com/NVIDIA/garak
garak checks if an LLM can be made to fail in a way we don't want. garak probes for hallucination, data leakage, prompt injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses. If you know nmap, it's nmap for LLMs.