Let's see. When I was younger I liked telephones. A lot. I still do. That included exploring the PSTN and causing general mischief. I have a Western Electric 1D2 payphone in my bedroom. Among other hobbies... I'm an amateur radio operator, Linux user, open source supporter and electronics meddler. I admire any human who has the patience to work in infosec.
I can't really stomach the wallowing echo chamber of Twitter, so maybe this will be better.
New T-shirt! (It was $5 on clearance) #lockpicking
Got a chance to tell a story on #DarknetDiaries with Jack Rhysider.
Ep 36: Jeremy from Marketing
"A company hires a penetration tester to pose as a new hire, Jeremy from Marketing, to see how much he can hack into in his first week on the job. It doesn’t go as planned."
You can listen to it here: https://darknetdiaries.com/episode/36/
"Reporting about copyright infringement is not infringement. The few thumbnails—including a single image from American Gods—act as proof of the story being reported and certainly don’t replace watching entire episodes of television."
"EFF’s Tweet About an Overzealous DMCA Takedown Is Now Subject to an Overzealous Takedown"
Some crazy people might even call this fraud.
Office Depot rigged PC malware scans to sell unneeded $300 tech support
I forget who originally posted this, but thank you. It's a superbly written article on the importance of reading fiction and its neurological implications towards creating empathy. I think empathy is important in security. It's valuable to know how an attacker or potential target thinks and operates, especially in a social engineering or OSINT scenerio.
Great article about how infosec on social media is really the minority of practitioners:
I'm reading through "Influence: The Psychology of Persuasion" and I have to say the commitment principle is fascinating. We as humans tend to make up all kinds of crazy justifications for a decision we have made once we make a commitment to that decision. This explains a lot of the crazies in politics, including the flat earthers.
In one corner we have the Master Lock 570, a pin tumbler lock with a dead core (not spring loaded) and 4 security pins. In the other corner we have a snake rake and tension wrench. Guess who wins? (Within 45 seconds, every single time.) #lockpicking
"'"No clue about VLANs, no clue about if it has STP, or trunking, or anything.'"
IT staff 'locked out' of data center's core switch after the only bloke who could log into it dies
Anyone else read this? Did you like it? #socialenginering
Sounds like these employees had interesting smoke breaks.
"A Russian 'troll slayer' went undercover at a troll factory and found that hundreds of Russians were working as paid trolls in rotating shifts"
Ex-investigative journalist, current infosec student, lifetime learner. Lock picking, Linux, OSINT, ham radio and much more. I also like whiskey and tequila.
A Mastodon instance for info/cyber security-minded people.