The official microG OS project (lineage.microg.org) leaked their private keys for logging into their servers and signing releases:
github.com/lineageos4mi...
We make our official builds on local machines. Our signing machine's keys aren't ever on any storage unencrypted.
06.03.2026 13:48
π 86
π 16
π¬ 4
π 4
Phrack Prophile on FX
Click to read the article on phrack
phrack.org/issues/68/2#...
Another legend has crossed over. Thank you @fxv2.bsky.social for being your kind, brilliant self, whose contributions are too many to name, not just in hacking, but in being a superconnector who I now know is responsible for so many friendships & marriages. You are missed.
02.03.2026 19:09
π 34
π 10
π¬ 3
π 1
How Russiaβs fatalities compare with Ukraineβs
After four years of fighting, our modelling reveals a grim toll
On the anniversary of the Russian invasion of Ukraine, our modelling suggests that Vladimir Putin is losing more men than he can recruit. Our charts explain the toll
25.02.2026 07:40
π 55
π 24
π¬ 1
π 1
Treasury sanctions Russian zero-day broker accused of buying exploits stolen from U.S. defense contractor | TechCrunch
The U.S. Treasury announced it was imposing sanctions against a Russian broker of zero-day exploits, its founder and two affiliates, citing a threat to U.S. national security. Another affiliated zero-...
NEW: The U.S. government is sanctioning Russian zero-day broker Operation Zero and its founder, alleging it acquired stolen hacking tools from U.S. defense contractor L3Harris Trenchant.
The U.S. said former Trenchant boss Peter Williams stole and sold these exploits to Operation Zero.
24.02.2026 19:03
π 16
π 10
π¬ 2
π 2
Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes
| Dark Mentor LLC
We hold this truth to be self-evident: SUFFERING BUILDS STRENGTH! In this talk I will walk you through the trials, tribulations, and triumph(!) of the worst debugging setup I've ever hacked together, which I used to reverse engineer the Realtek RTL8761B* family of Bluetooth chips.<p>This work was done because Bluetooth security tools are in an abominable state. We use "CSR4" (Cambridge Silicon Radio) dongles that don't support packets newer than Bluetooth 4.0 (released in 2010!), just to be able to spoof the Bluetooth Device Address (BDADDR) for MitM attacks.<p>Veronica Kovah & I have been creating Bluetooth security classes for <a href="https://ost2.fyi/">OpenSecurityTraining2</a>. And we wanted to use better hardware; ideally something that supports BT 5.4 (released in 2023). So I bought a bunch of cheap dongles off Amazon, and found that most of them used the same RTL8761B chip. So the goal was clear: at a minimum, figure out a way to spoof the BDADDR on these dongles. But I also a set out a nice-to-have stretch goal - to figure out how to use these dongles to send custom LMP packets (which are architecturally not meant to be under full user control.) That way, could replace a bulky and expensive $55 dev board (that is only used for BT Classic), with a cheap and small $14 USB dongle (which has a better antenna to boot!) This would make Blue2thprinting (released at Hardwear.io 2023), and thus Bluetooth reconnaissance & vulnerability assessment, cheaper & better.<p>Bloodied (but not broken) by the ordeal, I achieved my goals and stretch goals. And given that there are no public descriptions of how Realtek Bluetooth chips work, I look forward to sharing hitherto-unknown information about how to navigate and understand these mostly-16-bit-MIPS-code systems. And I'll discuss how their ROM-"patch"ing firmware update mechanism works, how you can patch it to change its code too, and the security implications thereof.
Video released for "Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes" (from @hardwear-io.bsky.social). Slides & video link here:
darkmentor.com/publication/...
23.02.2026 12:28
π 4
π 3
π¬ 0
π 0
The general counsel uploaded a picture on Linkedin showing the web panel of Paragon's spyware.
The panel shows a phone number in Czechia, Apps, Accounts, media on the phone, the interception status and numbers extracted from social media applications.
11.02.2026 15:29
π 80
π 26
π¬ 4
π 6
DOJ says Trenchant boss sold exploits to Russian broker capable of accessing 'millions of computers and devices' | TechCrunch
The former boss of the L3Harris-owned hacking and surveillance tools maker Trenchant faces nine years in prison for selling several exploits to a Russian broker, which counts the Russian government am...
NEW: U.S. prosecutors say the hacking tools that Peter "Doogie" Williams stole from defense contractor L3Harris Trenchant could have been used against "millions of computers and devices" worldwide.
Williams said he didn't know the tools could end up in the hands of Russia or other governments.
11.02.2026 18:42
π 9
π 7
π¬ 1
π 3
Hacker linked to Epstein removed from Black Hat cyber conference website | TechCrunch
Emails published by the Justice Department revealed cybersecurity veteran Vincenzo Iozzo emailed, and arranged to meet, Jeffrey Epstein multiple times between 2014 and 2018.
NEW: Cybersecurity veteran Vincenzo Iozzo, whowas linked to Epstein, has been removed from the webpage of the Black Hat conference review board.
Iozzo was in touch with Epstein 2014 to 2018, including after new stories came out about Epstein's sex trafficking crimes in late 2018, emails show.
12.02.2026 19:34
π 49
π 30
π¬ 1
π 2
Jeff Bezosβs wealth has increased an average of $70 million every day of 2026, meaning that he could have offset The Postβs losses with what heβs made since Monday.
05.02.2026 02:48
π 15314
π 4643
π¬ 445
π 251
To:
Jeffrey Epsteinfjeevacation@gmail.com]
From:
Sent:
Wed 5/28/2014 3:23:21 AM
Subject:
Before being freed, hacker Sabu was 'extraordinary' FBI informant - Los Angeles Times
Hire this kid. Im serious.
http://www.latimes.com/nation/la-na-hacker-sentencing-20140528-story.html
Well shit, here we go again with the latest Epstein files drop.
Hereβs an email from someone to Jeffrey Epstein telling him that he should hire Anonymous snitch sabu.
www.justice.gov/epstein/file...
30.01.2026 17:07
π 207
π 49
π¬ 7
π 21
Only ninety-nine (99) days to go!! High time to submit your abstract(s) to the program committee. We are really looking forward to receive & review them! cfp.nluug.nl.
28.01.2026 08:19
π 1
π 2
π¬ 0
π 0
This is directly related to the case of Charles Edward Littlejohn who stole the tax records of Trump, Bezos and other billionaires and leaked them to ProPublica, which published a series of stories in 2021 about them
26.01.2026 15:36
π 15
π 9
π¬ 3
π 1
Hoepman, J.-H. (2025). Is Authenticity an Effective Antidote to Misinformation?. Weizenbaum Journal of the Digital Society, 5(4). https://doi.org/10.34669/WI.WJDS/5.4.3
βCan digital signatures stop misinformation?
A new #WJDS paper by Jaap-Henk Hoepman argues they canβt β. Practical barriers exist, and there may be negative side effects.
π‘Read: doi.org/10.34669/WI....
#Misinformation #DigitalTrust #Research
09.12.2025 11:09
π 3
π 2
π¬ 1
π 0
Boycott U.S. journals and conferences
Boycott U.S. journals and conferences
blog.xot.nl/2026/01/21/b...
21.01.2026 09:13
π 4
π 2
π¬ 1
π 1
Telegramβs battle with European regulators could force it to hire thousands of content moderators to tackle illegal content. Documents obtained by Follow the Money show how Telegram is trying to fend off tougher oversight from Brussels.
www.ftm.eu/articles/tel...
20.01.2026 07:14
π 7
π 8
π¬ 0
π 0
Join | OCCRP
We are supported by people like you. Support us by becoming a member today.
For the last few days, weβve been fighting a DDoS attack from highly resourced actors trying to make OCCRPβs reporting inaccessible.
Your backing makes it possible for us to fight back more effectively. If youβd like to help strengthen our efforts, you can donate here: buff.ly/2BWJueR
16.01.2026 13:05
π 11
π 4
π¬ 0
π 0
Now you understand why every pro-Kremlin Twitter bot has spent 90% of its time over the past decade defending or pushing crypto and blockchain tech while randomly publishing some political tweet once in a while?
10.01.2026 16:29
π 24
π 21
π¬ 2
π 0
Spionage: BND hΓΆrte jahrelang US-PrΓ€sident Barack Obama ab
Der deutsche Geheimdienst ΓΌberwachte regelmΓ€Γig Telefonate des damaligen US-PrΓ€sidenten an Bord der Air Force One. Erlaubnis von Angela Merkel hatte der BND nicht.
Germanyβs foreign intelligence agency (BND) intercepted phone conversations of former President Barack Obama while he was aboard Air Force One over several years. The interceptions exploited vulnerabilities in the aircraftβs encryption and known frequencies.
www.zeit.de/politik/ausl...
04.01.2026 18:25
π 119
π 45
π¬ 7
π 20
Perceptions Of Counterintelligence In Corporate And Academic Sectors: Risks, Awareness, And Strategic Implications
The United States is in the middle of an intelligence war. Foreign adversaries, including their intelligence services and state-sponsored actors, employ increasingly sophisticated technologies and methods to access our most valuable innovations and secrets. The importance of implementing counterintelligence (CI) practices across all sectors of American society has never been greater. As our adversaries increasingly target non-governmental data environments, it has become essential to address security gaps in our nationβs critical industries, supply chains, and academic institutions. While the last two decades have seen the widespread adoption of cybersecurity protocols, malign actors continue to evolve their tactics to exploit both technical and human vulnerabilities. Counterintelligence can and should be a vital tool for corporations and academia which have become increasingly vulnerable targets for foreign espionage, theft, sabotage, and influence operations. By providing strategic insights and actionable practices, counterintelligence enables organizations to effectively and efficiently recognize and respond to threats that fall outside the scope of traditional cybersecurity. This study aims to explore how counterintelligence is perceived in civilian sectors β specifically corporate and academic institutions β in response to escalating intelligence threats. By surveying a diverse range of professionals in the academic and corporate sectors, this study assesses the awareness, attitudes, and institutional barriers to adopting CI practices and seeks to highlight key knowledge gaps and identify opportunities for targeted awareness, training, and investment. The results will inform policy and provide strategic recommendations for building a CI-conscious culture across sectors.
New addition
Report: Perceptions Of Counterintelligence In Corporate And Academic Sectors: Risks, Awareness, And Strategic Implications (published 22-11-2025)
https://zenodo.org/records/17681907
16.12.2025 22:31
π 1
π 1
π¬ 0
π 0
Belarusian KGB put spyware on phones of detained journalist.
Growing list of cases where authoritarian regimes use detention to implant spyware on phones:
π¦ Belarus
π¦ Kenya
π¦ Serbia
And likely plenty more.
Important investigation & reminder that dictators don't always need zero-days.
17.12.2025 15:45
π 55
π 36
π¬ 1
π 0