Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

iampytest1@infosec.exchangeI

iampytest1@infosec.exchange

@iampytest1@infosec.exchange
About
Posts
32
Topics
22
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • 313 Team says they have resumed their attack.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    313 Team says they have resumed their attack.

    I can confirm Goodreads is offline.

    #Goodreads #GoodreadsDown #DDoS #313Team

    Uncategorized goodreads goodreadsdown ddos 313team

  • Lawfare has obtained and published transcripts from the Fulton County grand jury which investigated Donald Trump's attempts to overturn the 2020 election.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    Lawfare has obtained and published transcripts from the Fulton County grand jury which investigated Donald Trump's attempts to overturn the 2020 election.

    Behind CloudFlare (no alternative available): https://www.lawfaremedia.org/projects-series/testimony-heard-by-the-trump-grand-jury-in-fulton-county

    #ElectionSecurity #Journalism

    Uncategorized electionsecurit journalism

  • I was reading this story (https://www
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    I was reading this story (https://www.rawstory[.]com/trump-2676869375/), and noticed this:

    Informally known as the “Doomsday Book,” Taylor explained that the secret book is secured in a location “known to only a handful of people,” and was created under the Eisenhower administration “to keep the country running if Washington was destroyed in a nuclear strike.”

    The words "Doomsday Book" are linked to...
    https://archive[.]is/o/MBaLl/https://www.vanityfair.com/news/2023/06/it-will-be-a-revenge-machine-why-a-second-trump-administration-would-be-much-worse

    That Vanity Fair article is linked in the iNews article which Raw Story's piece is based off of.
    So, what this means is that the author of the Raw Story article used archive.today to read the iNews piece.

    We actually can confirm this.
    If we break down the URL, it has these parts:
    https://archive.is/o/[id of archived page]/[URL on archived page]

    archive.today modifies all the links on archived pages to go through this redirect.

    So the URL on the archived page is https://www.vanityfair.com/news/2023/06/it-will-be-a-revenge-machine-why-a-second-trump-administration-would-be-much-worse

    And the archived page containing that URL is https://archive[.]is/MBaLl

    Which is the iNews article. And the iNews article has a paywall.

    So, journalists are using archive.today to bypass paywalls on other news websites.

    Here is an archived copy of the article before it gets fixed: https://web.archive.org/web/20260508150858/https://www.rawstory.com/trump-2676869375/

    Uncategorized

  • Threat Intelligence people who follow this type of thing:How creditable is 313 Team in your experience
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    RE: https://infosec.exchange/@iampytest1/116539509905680953

    Threat Intelligence people who follow this type of thing:
    How creditable is 313 Team in your experience?
    Have they claimed responsibility for attacks they didn't commit before?
    Or are the attacks they claim responsibility for generally confirmed?

    I genuinely am curious; I lack the expertise and information to critically evaluate 313 Team's claims.

    I know there are people who have been tracking them and similar groups for a while, and who have a way better idea of their credibility.

    #Cybersecurity #313Team #Iran #ThreatIntel

    Uncategorized cybersecurity 313team iran threatintel

  • BREAKING NEWS
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    This week is finals week for many colleges and universities; it is unclear how they intend to handle this outage.

    Uncategorized canvas ddos cybersecurity

  • BREAKING NEWS
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    BREAKING NEWS

    313 Team has taken down Canvas, a learning management system used by many school districts and universities.

    According to a post in 313 Team's Telegram channel, the attack is scheduled to continue for four hours.

    I have independently confirmed Canvas is down.

    I reached out to 313 Team for comment, and am awaiting a response.

    #Canvas #DDoS #Cybersecurity

    Uncategorized canvas ddos cybersecurity

  • For those who don't want to go to archive.today, here is a copy of M$'s incorrect documentation: https://iam-py-test.github.io/security_research/[archive.ph%20MgBI8]%20Internet%20Shortcuts%20-%20Win32%20apps%20_%20Microsoft%20Learn.pdf
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    RE: https://infosec.exchange/@wdormann/116533862391306228

    For those who don't want to go to archive.today, here is a copy of M$'s incorrect documentation: https://iam-py-test.github.io/security_research/[archive.ph%20MgBI8]%20Internet%20Shortcuts%20-%20Win32%20apps%20_%20Microsoft%20Learn.pdf

    Captured from archive.today

    Uncategorized

  • A request for comment sent to abuse@beamed.su was unsuccessful
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    RE: https://infosec.exchange/@iampytest1/116518730690056225

    A request for comment sent to abuse@beamed.su was unsuccessful.
    According to my email provider, multiple attempts to send the email resulted in the error:

    abuse@beamed.su: connect to beamed.su[104.21.75.211]:25: Connection timed out

    I am going to reach out for comment via Telegram.

    Uncategorized

  • According to a report, children were trivially able to circumvent age verification by stealing their parent's ID or drawing facial hair onto their face.46% of children surveyed viewed age verification measures as easy to bypass.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    Do you need to be a genius to figure out that children will just steal their parent's ID?

    Heck, most parents would probably just give their ID to their kid, no questions asked.
    Especially if the kid screams and complains.

    Uncategorized

  • According to a report, children were trivially able to circumvent age verification by stealing their parent's ID or drawing facial hair onto their face.46% of children surveyed viewed age verification measures as easy to bypass.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    According to a report, children were trivially able to circumvent age verification by stealing their parent's ID or drawing facial hair onto their face.
    46% of children surveyed viewed age verification measures as easy to bypass.

    https://www.internetmatters.org/wp-content/uploads/2026/04/Internet-Matters-Online-Safety-Act-Report-May-2026.pdf (page 15)

    Moreover, as one parent interviewed said:

    “Kids don’t know the difference between a genuine website and a website that isn’t genuine. If all websites have facial verifications [sic] and they go on a website that is not genuine, their face and their documents could be used to do illegal stuff.”

    I personally wouldn't limit that to children; adults are pretty easy to fool.

    Uncategorized

  • We’re also adding visual analysis as a new technique to aid our detection efforts.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    RE: https://infosec.exchange/@iampytest1/116522456988105595

    We’re also adding visual analysis as a new technique to aid our detection efforts. This technology allows our AI to scan photos and videos for visual clues about a person’s age that text might miss.

    What happens if I - and adult - post a (consensual) photo of my kid on my social media? Does that make me a kid?
    Either I'm missing something or Meta didn't think this through.

    Can I circumvent this by posting a ton of stock photos of adults and then an occasional photo of me (if I were a kid, which I'm not)?

    Our AI looks at general themes and visual cues, for example height or bone structure, to estimate someone’s general age

    Does this have any basis in science?
    I almost failed my high school biology class and never took one in college, so I'm not exactly qualified to speak on human anatomy. That said, I'm skeptical and it seems others on Fedi are as well.

    https://about.fb.com/?p=48124&shareadraft=69f8d6967e5b1

    Uncategorized

  • I reached out to beamed.su for comment regarding 313 Team's alleged use of their systems, and am awaiting a response.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    To beamed.su: I remain open minded.
    Please respond 🙂

    I might write a hit piece on you in five months... wait, wrong DDoS.

    Uncategorized 313team beamedsu

  • I reached out to beamed.su for comment regarding 313 Team's alleged use of their systems, and am awaiting a response.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    RE: https://infosec.exchange/@iampytest1/116518708785669528

    I reached out to beamed.su for comment regarding 313 Team's alleged use of their systems, and am awaiting a response.

    #313Team #BeamedSU

    Uncategorized 313team beamedsu

  • We offer bypasses for a wide range of CDNs and firewalls, such as Cloudflare
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    RE: https://infosec.exchange/@mttaggart/116518022621367937

    We offer bypasses for a wide range of CDNs and firewalls, such as Cloudflare

    server: cloudflare

    Uncategorized

  • It seems Mozilla is now pushing their VPN through Firefox, integrating it into the browser and offering a limited amount of bandwidth for free per a month.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    It seems Mozilla is now pushing their VPN through Firefox, integrating it into the browser and offering a limited amount of bandwidth for free per a month.

    If I wanted to hide my IP address while browsing, I would use Tor (and do use Tor), which is more private than any VPN.

    I also wonder how securely implemented this is. VPN browser extensions are extremely vulnerable to leaks and are basically garbage, but this is implemented into the browser, so maybe - hopefully - it is less vulnerable to leaks.

    #Firefox

    Uncategorized firefox

  • @deviantollam on school security hardware at ISC West.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    @deviantollam on school security hardware at ISC West.

    - YouTube

    Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.

    favicon

    (www.youtube.com)

    I personally liked the ISC content; I found it informative and not just shilling for the companies, though I get not everyone agrees with me.

    Uncategorized

  • For the last 20 years, employees could accept the intense external criticism and awkward conversations with family and friends about working for a company named after J. R. R. Tolkien’s corrupting all-seeing orb.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    For those who don't get it, at the end of the Lord of the Rings, Saruman (calling himself Sharkey) takes over the Shire, and exploits the hobbits for his own personal profit. All which is good in the Shire is destroyed or co-opted for Sharkey's benefit.
    One hobbit, Ted Sandyman, sides with the oppressors to his own personal benefit.

    Sharkey is eventually attacked by his own disgruntled employee before the hobbits can deal with him. Being an immortal being, he doesn't die, but his physical form is destroyed.

    Saruman was corrupted by Sauron through his Palantir (that's an oversimplification, yes I know).

    Uncategorized

  • Ted Sandyman is wondering if he is one of the baddies.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    RE: https://infosec.exchange/@iampytest1/116455768887330487

    Ted Sandyman is wondering if he is one of the baddies.

    Uncategorized

  • For the last 20 years, employees could accept the intense external criticism and awkward conversations with family and friends about working for a company named after J. R. R. Tolkien’s corrupting all-seeing orb.
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    For the last 20 years, employees could accept the intense external criticism and awkward conversations with family and friends about working for a company named after J. R. R. Tolkien’s corrupting all-seeing orb. But a year into Trump’s second term, as Palantir deepens its relationship with an administration many workers fear is wreaking havoc at home, employees are finally raising these concerns internally, as the US’s war on immigrants, war in Iran, and even company-released manifestos has forced them to rethink the role they play in it all.

    Maybe the name was a hint or something.
    Palantir is the type of company who would side with Saruman against the hobbits.

    Maybe Palantir should remember what happened to Sharkey and his minions.

    Link Preview Image
    Palantir Employees Are Starting to Wonder if They’re the Bad Guys

    Interviews with current and former Palantir employees, along with internal Slack messages obtained by WIRED, suggest a workforce in turmoil.

    favicon

    WIRED (www.wired.com)

    Uncategorized

  • Concerning, a certain infosec training website I won't name is teaching students how to do digital forensics using an ancient version of Firefox
    iampytest1@infosec.exchangeI iampytest1@infosec.exchange

    Concerning, a certain infosec training website I won't name is teaching students how to do digital forensics using an ancient version of Firefox.
    The software they use wouldn't work on any version of Firefox released any time after 2017.

    Uncategorized
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups