Security / Privacy
RSS
Tesla Begins Production of Cybercab
(barrons.com)
I built VerdictMail as a homelab project to explore whether combining
classical email authentication signals with LLM reasoning produces better
threat classification than either approach alone.<p>It runs as a daemon on Ubuntu, monitors a Gmail inbox via IMAP IDLE, and
processes every incoming mes...
What are some security best practices for using AI tools that have so much access to data on your computer or inside your network, if you use a separate computer?
Documentary about Mozilla Firefox at pwn2own (part 1)
(youtube.com)
Bootstrapping Is Not Security Paranoia
(alganet.github.io)
'Starkiller Phishing Service Proxies Real Login Pages, MFA
(krebsonsecurity.com)
Privacy first image converted / copressor
(twitter.com)
Behavioral NPM malware detection without CVEs
(westbayberry.com)
Hi,<p>I built tlsctl, a small CLI for inspecting, testing, and debugging TLS connections:<p><a href="https://github.com/catay/tlsctl" rel="nofollow">https://github.com/catay/tlsctl</a><p>It aims to make TLS diagnostics more readable and structured than stitchi...
I fell for a phishing attack and lost access to my X account
(christianheilmann.com)
I've been using Claude Code a lot recently and wanted visibility into security-relevant executions — the kind of thing you may not necessarily catch while the agent is running.<p>CanaryAI is a macOS menu bar app that monitors Claude Code session logs and alerts on suspicious behaviour: reverse ...
Can I get a version of Windows that hasn't been infiltrated by Co-Pilot malware?
(learn.microsoft.com)
Portable GELI block device encryption for Linux (2021)
(bijanebrahimi.github.io)
UTS #39: Unicode Security Mechanisms
(unicode.org)
Addressing Common Misconceptions about .NET in the InfoSec World
(blog.washi.dev)