helvede.net is one of the many independent Mastodon servers you can use to participate in the fediverse.
Velkommen til Helvede, fediversets hotteste instance! Vi er en queerfeministisk server, der shitposter i den 9. cirkel. Welcome to Hell, We’re a DK-based queerfeminist server. Read our server rules!

Server stats:

168
active users

#forensics

1 post1 participant0 posts today
The New Oil<p>Cyber Forensic Expert in 2,000+ Cases Faces <a href="https://mastodon.thenewoil.org/tags/FBI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FBI</span></a> Probe</p><p><a href="https://krebsonsecurity.com/2025/04/cyber-forensic-expert-in-2000-cases-faces-fbi-probe/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/04/cy</span><span class="invisible">ber-forensic-expert-in-2000-cases-faces-fbi-probe/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://mastodon.thenewoil.org/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a></p>
Dr. Mozelle Martin<p>I’ve spent 37+ years in forensic handwriting analysis, including consulting on cold cases and training law enforcement internationally.</p><p>With a PhD in Applied Ethics and ongoing studies in constitutional + human rights law, my focus is on integrity, evidence, and reputation in high-conflict digital environments.</p><p>I’ll be using this space to quietly track patterns that apply to my work.</p><p><a href="https://mastodon.social/tags/ForensicHandwriting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ForensicHandwriting</span></a> <a href="https://mastodon.social/tags/DigitalEthics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalEthics</span></a> <a href="https://mastodon.social/tags/ColdCases" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ColdCases</span></a> <a href="https://mastodon.social/tags/InkProfiler" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InkProfiler</span></a> <a href="https://mastodon.social/tags/Forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forensics</span></a> <a href="https://mastodon.social/tags/EthicsMatters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicsMatters</span></a></p>
Sajid Nawaz Khan :donor:<p>For hobbyist Cobalt Strike Beacon collectors, note that the recently announced 4.11 update introduces a number of changes to frustrate Beacon configuration extraction, namely through the new `transform-obfuscate` field.</p><p>When set, this field can apply multiple layers of encoding, encryption and compression (with some recent Beacons observed with a 32 byte XOR key, configurable upto 2048 bytes!).</p><p>While still reasonably trivial to decode manually, standard automated workflows (say, through the SentinelOne parser) will now fail, not least because of changes to the well-known field markers.</p><p>Beacons with these characteristics have thus far been observed with watermarks indicative of licensed instances, though I imagine it is only a matter of time before the 4.11 capabilities become accessible to all manner of miscreants.</p><p>A sample configuration, via a staged Beacon on 104.42.26[.]200 is attached, including the three distinct XOR keys used to decode it.</p><p><a href="https://www.cobaltstrike.com/blog/cobalt-strike-411-shh-beacon-is-sleeping" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cobaltstrike.com/blog/cobalt-s</span><span class="invisible">trike-411-shh-beacon-is-sleeping</span></a></p><p><a href="https://infosec.exchange/tags/cobaltstrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cobaltstrike</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a></p>
GrrlScientist ⧖ Ⓥ<p>Crime Investigation Tool Reveals Origins Of UK’s Feral Parrots</p><p>"A recent study identified where the UK’s naturalized parakeets came from by adapting a powerful crime investigation technique designed to locate and identify serial criminals"</p><p>by <span class="h-card" translate="no"><a href="https://mastodon.social/@grrlscientist" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>grrlscientist</span></a></span> via <a href="https://mastodon.social/tags/Substack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Substack</span></a> </p><p><a href="https://mastodon.social/tags/parrots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parrots</span></a> <a href="https://mastodon.social/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://mastodon.social/tags/parakeets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parakeets</span></a> <a href="https://mastodon.social/tags/London" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>London</span></a> <a href="https://mastodon.social/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://mastodon.social/tags/SciComm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SciComm</span></a> <a href="https://substack.com/home/post/p-156158357" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">substack.com/home/post/p-15615</span><span class="invisible">8357</span></a></p>
IAintShootinMis<p>My little thread about <a href="https://digitaldarkage.cc/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> Desktop <a href="https://digitaldarkage.cc/tags/memory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>memory</span></a> <a href="https://digitaldarkage.cc/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> is jumping in popularity after that @Atlantic article hit the web. </p><p>Need to dig deeper in, if anyone knows how to carve a data segment out of memory for a specific PID using Vol3, that would be super helpful. Just a thought</p><p><a href="https://digitaldarkage.cc/@iaintshootinmis/114198799142386731" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">digitaldarkage.cc/@iaintshooti</span><span class="invisible">nmis/114198799142386731</span></a></p>
earthling<p>File System Forensics by Fergus Toolan, 2025</p><p>Comprehensive forensic reference explaining how file systems function and how forensic tools might work on particular file systems. File System Forensics delivers comprehensive knowledge of how file systems function and, more importantly, how digital forensic tools might function in relation to specific file systems. </p><p><span class="h-card" translate="no"><a href="https://a.gup.pe/u/bookstodon" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bookstodon</span></a></span> <br><a href="https://mastodon.social/tags/books" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>books</span></a> <br><a href="https://mastodon.social/tags/nonfiction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nonfiction</span></a> <br><a href="https://mastodon.social/tags/computers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computers</span></a> <br><a href="https://mastodon.social/tags/FileSystems" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FileSystems</span></a> <br><a href="https://mastodon.social/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a></p>
your auntifa liza 🇵🇷 🦛 🦦<p>❝ A team of forensic scientists in Argentina is helping to bring peace to families who lost their loved ones in the so-called "Dirty War".</p><p>That was a period in the 1970s and '80s when government death squads hunted down and killed political opponents.</p><p>The work to identify those who disappeared is ongoing and scientists are lending the skills they developed to other conflict areas across the globe.❞ </p><p><a href="https://youtu.be/3tnR8nHkKVY" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/3tnR8nHkKVY</span><span class="invisible"></span></a> </p><p><a href="https://mastodon.social/tags/Argentina" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Argentina</span></a> <a href="https://mastodon.social/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://mastodon.social/tags/desaparecidos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>desaparecidos</span></a></p>
your auntifa liza 🇵🇷 🦛 🦦<p>ps: </p><p>turn on auto-translation with closed-captioning </p><p>Informe: Equipo Argentino de Antropología Forense - <br>40 Años de Democracia</p><p><a href="https://youtu.be/JsqXZsrJj78" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/JsqXZsrJj78</span><span class="invisible"></span></a> </p><p><a href="https://mastodon.social/tags/Argentina" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Argentina</span></a> <a href="https://mastodon.social/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://mastodon.social/tags/desaparecidos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>desaparecidos</span></a></p>
Miguel Afonso Caetano<p>"As with other forensic innovations, like forensic genetic genealogy or facial recognition, FDP is sold as an “investigative tool” — that is, a product not intended for use as evidence in a criminal proceeding, but as a behind-the-scenes aide to police searching for perpetrators. But selling a scientifically questionable product as a mere investigative tool can have real-world consequences.</p><p>For FDP in particular, experts warn that the composite images can reinforce racial stereotypes, encourage the over-surveillance of marginalized communities, and deny criminal defendants important information about how they became a target of an investigation, which raises serious implications for Fourth Amendment privacy rights. Composites like those Parabon sells could also inadvertently taint the memories of eyewitnesses to a crime, risking potentially valuable evidence.</p><p>Paula Armentrout, Parabon’s co-founder, provided written responses to questions from The Intercept about the company’s Snapshot program. In part, the company said that The Intercept “should not quote any of the presenters” at the NAS workshop, who it claims “made many false, uninformed, and misleading statements that were not based on evidence or facts, but on misinformation propagated by inaccurate media articles, hearsay, and their own personal and political agendas.”</p><p>Walsh insists her criticisms are motivated solely by her fidelity to the science and to ensuring the transparency and accuracy of forensic tools used in the criminal legal system. To that end, she was emphatic during the workshop: Law enforcement should not be allowed to purchase phenotyping composites. “The science isn’t there. We shouldn’t be doing it,” she said. At this juncture, she said, those sketches are about as scientific as “my son drawing them.”"</p><p><a href="https://theintercept.com/2025/02/02/forensic-dna-phenotyping-parabon-nanolabs-police/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">theintercept.com/2025/02/02/fo</span><span class="invisible">rensic-dna-phenotyping-parabon-nanolabs-police/</span></a></p><p><a href="https://tldr.nettime.org/tags/PseudoScience" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PseudoScience</span></a> <a href="https://tldr.nettime.org/tags/Surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Surveillance</span></a> <a href="https://tldr.nettime.org/tags/Forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forensics</span></a> <a href="https://tldr.nettime.org/tags/CivilLiberties" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CivilLiberties</span></a> <a href="https://tldr.nettime.org/tags/DNA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNA</span></a> <a href="https://tldr.nettime.org/tags/Phrenology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phrenology</span></a></p>
Tyler Hudak<p>I've had to analyze several MS Quick Assist compromises and found challenges during each one. Threat Hunting for malicious activity thru QA is not easy either. </p><p>So I wrote a blog post on what to look for: <a href="https://inversion6.com/resources/blog/january-2025/microsoft-quick-assist-an-it-security-primer" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">inversion6.com/resources/blog/</span><span class="invisible">january-2025/microsoft-quick-assist-an-it-security-primer</span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incidentresponse</span></a> <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a></p>
FrancescaJ<p>Anyone know how to remove fingerprint powder from aluminium door frames? Online suggests ammonia based cleaner and while it’s improved things it’s still clearly there. Sigh <a href="https://mastodon.nz/tags/cleaning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cleaning</span></a> <a href="https://mastodon.nz/tags/crime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crime</span></a> <a href="https://mastodon.nz/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> Retoots welcome</p>
sb arms & legs<p>A friend of mine with severe <a href="https://metroholografix.ca/tags/dementia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dementia</span></a> possibly had their <a href="https://metroholografix.ca/tags/iPhone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPhone</span></a> and <a href="https://metroholografix.ca/tags/iPad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPad</span></a> compromised by a <a href="https://metroholografix.ca/tags/scammer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scammer</span></a>. I've offered to do some basic <a href="https://metroholografix.ca/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> on it, and ensure there is no rouge software, change passwords, etc. </p><p>I am not, however, an <a href="https://metroholografix.ca/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> person, so I'm not really sure what the best tools will be to do so. </p><p>Please, if you know of resources for tools and processes, please comment below! Please <a href="https://metroholografix.ca/tags/boost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>boost</span></a> for reach!</p>
Steven Zekowski<p>&gt; Forensic Architecture’s latest report documents the extent and intent of Israel’s assault on the Gaza Strip, strengthening South Africa’s case in the ICJ charging Israel with the crime of genocide.</p><p><a href="https://freeradical.zone/tags/genocide" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>genocide</span></a> <a href="https://freeradical.zone/tags/gaza" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gaza</span></a> <a href="https://freeradical.zone/tags/israel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>israel</span></a> <a href="https://freeradical.zone/tags/palestine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>palestine</span></a> <a href="https://freeradical.zone/tags/maps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maps</span></a> <a href="https://freeradical.zone/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> </p><p>Mapping the genocide in Gaza – Mondoweiss <a href="https://mondoweiss.net/2024/12/mapping-the-genocide-in-gaza/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mondoweiss.net/2024/12/mapping</span><span class="invisible">-the-genocide-in-gaza/</span></a></p>
Harry Sintonen<p>Finland is flying investigators to the Eagle S, and is interrogating the crew. The officials have confiscated the communications devices and storage media (cellphones, tablets, laptops, external storage devices I presume) and will perform <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> on them. Several crew members are suspected of aggravated criminal mischief. If convicted the penalty ranges from 2 to 10 years imprisonment.</p><p><a href="https://infosec.exchange/tags/infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastructure</span></a> <a href="https://infosec.exchange/tags/ESTLINK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESTLINK</span></a> <a href="https://infosec.exchange/tags/estlink2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>estlink2</span></a></p>
Miri<p>Question for the <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> folks.</p><p>You have a server that is only accessible if you have cleared the VPN or are in the office. There are failed logins on said server. All are logon type 3. There are only 2 people on the VPN (both security people) and no one in the office. No unusual connections on VPN. The failed logins are for a variety of accounts. None of them are service accounts, and several of the accounts are in AD, but don’t have access to the server. In the 4625 event logs, there’s no source IP beyond the firewall IP. CrowdStrike cannot identify an IP aside from the firewall IP. The firewall logs show failed login attempts (spray), but no successful connections beyond the 2 already mentioned.</p><p>Any ideas on what could be causing the failed logins on the server?</p>
:radare2: radare :verified:<p>❄️Ready for the Advent of Radare? ❄️<br>--&gt; <a href="https://radare.org/advent" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">radare.org/advent</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/aor24" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aor24</span></a><br>Starting tomorrow, December 1st we will release every day a new article with general knowledge, tricks, scripts and challenges to solve with radare2 covering topics from <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/firmwareanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firmwareanalysis</span></a> <a href="https://infosec.exchange/tags/debugging" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debugging</span></a> <a href="https://infosec.exchange/tags/exploiting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploiting</span></a> <a href="https://infosec.exchange/tags/binaryanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>binaryanalysis</span></a> <a href="https://infosec.exchange/tags/lowlevel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lowlevel</span></a> <a href="https://infosec.exchange/tags/assembly" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>assembly</span></a></p>
Schneier on Security RSS<p>What Graykey Can and Can’t Unlock</p><p>This is from 404 Media:<br>The Graykey, a phone unlocking and forensics tool that is used by law enforcement around the wo... <a href="https://www.schneier.com/blog/archives/2024/11/what-graykey-can-and-cant-unlock.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">4/11/what-graykey-can-and-cant-unlock.html</span></a></p><p> <a href="https://burn.capital/tags/lawenforcement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lawenforcement</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cellphones" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cellphones</span></a> <a href="https://burn.capital/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://burn.capital/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://burn.capital/tags/iPhone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPhone</span></a></p>
Susan Ville<p>📲 Must watch! </p><p>“Israel aims to cancel and erase Palestinian life!” UN Special Rapporteur for the occupied Palestinian territory, Francesca Albanese, and director of Forensic Architecture, Eyal Weizman, expose the mechanics of Israel’s <a href="https://mastodon.social/tags/genocide" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>genocide</span></a> in <a href="https://mastodon.social/tags/gaza" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gaza</span></a>. </p><p><a href="https://mastodon.social/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a> <a href="https://mastodon.social/tags/icc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>icc</span></a> <a href="https://mastodon.social/tags/urbandestruction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>urbandestruction</span></a> <a href="https://mastodon.social/tags/warcrimes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>warcrimes</span></a> <a href="https://mastodon.social/tags/ihl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ihl</span></a> </p><p>Talk w/Palestinian journalist from Gaza, Ahmed Alnaouq --</p><p>Credit: Palestine Deep Dive (YT)</p><p>👇 </p><p><a href="https://www.youtube.com/watch?v=8Ouu_ABYJGo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=8Ouu_ABYJG</span><span class="invisible">o</span></a></p>
Einstein^Vaderbilt<p>You know how <a href="https://defcon.social/tags/RichardStallman" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RichardStallman</span></a> <a href="https://defcon.social/tags/GNU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNU</span></a> laments <a href="https://defcon.social/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> but also how nothing works without it? <a href="https://www.gnu.org/philosophy/javascript-trap.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gnu.org/philosophy/javascript-</span><span class="invisible">trap.html</span></a><br>Alright, so say you torsocks lynx ( <a href="https://defcon.social/tags/KU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KU</span></a> ) <a href="https://defcon.social/tags/ProjectGutenberg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ProjectGutenberg</span></a>. Alternately, you could use highest security <a href="https://defcon.social/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> with <a href="https://defcon.social/tags/noscript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>noscript</span></a>. But have you tried <a href="https://defcon.social/tags/Vanguards" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vanguards</span></a> <a href="https://defcon.social/tags/Whonix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Whonix</span></a> GW with <a href="https://defcon.social/tags/vlc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vlc</span></a> ? There is a lot that can be done with vlc for media that wouldn't work in a tor browser (netscape-plus) with vanguards. You would think that there is more anonymity because more people use the more popular <a href="https://defcon.social/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> / <a href="https://defcon.social/tags/terminal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>terminal</span></a> -plus method but there are trade-offs with functionality and less data leaking. Is less data leaking a form of fingerprint? <span class="h-card" translate="no"><a href="https://infosec.pub/u/mokancan" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mokancan</span></a></span> <br><a href="https://defcon.social/tags/Forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forensics</span></a> <a href="https://defcon.social/tags/JavaScript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JavaScript</span></a> <a href="https://defcon.social/tags/Anonimity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Anonimity</span></a> <a href="https://defcon.social/tags/FreeSpeech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeSpeech</span></a> <a href="https://defcon.social/tags/FreedomOfInformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreedomOfInformation</span></a> <a href="https://defcon.social/tags/censorship" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>censorship</span></a> <a href="https://defcon.social/tags/Fingerprinting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fingerprinting</span></a></p>
ampoffcom<p>I just released FileTrove v1.0.0-BETA.2. This release comes with an installation package for Debian/Ubuntu, Yara-X support and a new debug flag.</p><p>If you'd test in on a test system and give some feedback, that would be nice :awesome: </p><p><a href="https://github.com/steffenfritz/FileTrove/releases/tag/v1.0.0-BETA.2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/steffenfritz/FileTr</span><span class="invisible">ove/releases/tag/v1.0.0-BETA.2</span></a></p><p>As the YARA-X library is compiled against a specific C lib, you might see some errors. However, an up-to-date Debian 12 or Ubuntu should work.</p><p>Oh, btw. FileTrove has a man page!</p><p><a href="https://chaos.social/tags/digipres" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digipres</span></a> <a href="https://chaos.social/tags/digitalpreservation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitalpreservation</span></a> <a href="https://chaos.social/tags/forensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forensics</span></a></p>