Has anyone any good reading on reverse engineering firmware with qemu?

Never mind asking for a TAN and password parts on the phone. It's not like criminals will ever call you and ask for these very things. 🤦‍♂️

A request, please boost.

Anyone who does podcasts in the IT/infosec/hacking world... I would like to be a guest sometime if you'd have me...

I need to up BlackFire's visibility, and as such, talking is a great way to do that.

So, if you are ever looking for a guest/stand in co-host/ whatever... I am available.

Very confusing times; it looks like #RichardStallman is being forcibly separated from everything he ever created as well as the place of those creations (MIT) http://techrights.org/2019/09/28/rms-being-canceled/ #mit #gnu #rms #fsf

don't look at the man behind the curtain 

What does #systemd do wrong? How is it done better elsewhere?

First demerits for systemd:
- main repo on github
- claims to be modular but I know only mxlinux to mix and mingle.
- allows vendors to set a service as active
- locks majority of focus to doing things only compatible with systemd

That's about it?
Otherwise, it does its job and has much documentation; devs are responsive; it has no lagging parts (everything is kept up-to-date and coordinated).

```man systemd.index```

What's rediculous to me is, there are people who have absolutely no OpSec posting Willy nilly every where and then complain about it being scraped online. Consent was applied when you posted to an internet that propogates the data. Don't graffiti something and then yell at people who photograph it.

“This is ground zero for what these devices will be used for...” - @adam in his discussion of how in a recent child-abuse case the Ring & (likely) Alexa footage was seized by law enforcement.

This is the underlying message people should come away with. The surveillance is being normalized through stories like this. This is why I listen to No Agenda, it makes you think. Always. #TYFYC

RT @zackwhittaker@twitter.com

These documents show how Nokia supplies — and its engineers install — lawful intercept equipment, which the FSB uses to collect the communications of citizens.

Here's one of these SORM devices. It's about the size of a washing machine.

More: techcrunch.com/2019/09/18/russ

🐦🔗: twitter.com/zackwhittaker/stat

Okay. I might be paranoid but it's weird.

1) I installed Ubuntu 18 Desktop editiion.
2) I got "nethogs" package for monitoring my traffic.
3) I left it for few hours.
4) I noticed some process was communicating with random IP address (which was lame for fresh install).
5) It turned out to be "Amazon server". It might be related to preinstalled Amazon application on Ubuntu desktop (which I've never touched or launched).

The question is: "Why do they do that?"

I feel like putting it together would be like a weird tutorial on installing Gentoo

Like I said last week, all these articles about RMS were timed perfectly to shift attention away from #billgates #MIT scandal (very real and major scandal). In the #googlebombing sense, this was a perfect PR coup.

Is there a hardback of all the Linux source code? I want one but don't want to do the legwork.

Microsoft Acquires Semmle, GitHub Now a CVE Numbering Authority [Just another variation of the "let us do that for you so you can focus on your core business" pitch.] sobr.org/fuZ

Why does no one want to talk about fiber optics at the bar with me :blobcatthonking:

Pink Floyd - When The Tigers Broke Free (Original)

I do NOT own any writes to this song. Song written and recorded by Pink Floyd and all credit goes to them for making this masterpece. i do believe EMI owns t...

youtu.be/l9b9UhFe6Eg

Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.