ExtremePaperClip

11.6K posts

ExtremePaperClip banner
ExtremePaperClip

ExtremePaperClip

@ExtremePaperC

Lifelong Student of Everything! #InfoSec Engineer, Digital Forensics, Linux Geek, #BlueTeam, History Buff, Loads of Fun (tweets&opinions=mine)

가입일 Aralık 2008
2.5K 팔로잉794 팔로워
고정된 트윗
ExtremePaperClip
ExtremePaperClip@ExtremePaperC·
@InsiderPhD That LEGO set looks awesome! Wish I was there! Also: go to Taqueria Cancun on 19th and Mission and get a Torta with Carne Asada. That used to be my fav.
English
1
0
1
116
Katie Paxton-Fear
Katie Paxton-Fear@InsiderPhD·
At BSidesSF today? Come say hi and grab some SWAG 😎 courtesy of myself and Semgrep
Katie Paxton-Fear tweet media
English
2
2
76
3.2K
Dave Kennedy
Dave Kennedy@HackingDave·
👀👽👾🛸
Skywatch Signal@UAPWatchers

🚨Well this is interesting... Aliens.Gov Name: aliens.gov Registry Domain ID: DF133F918-GOV Domain Status: serverTransferProhibited Nameservers:…cloudflare.comwally.ns.cloudflare.com Dates Registry Expiration: 2027-03-17 18:55:49 UTC Updated: 2026-03-17 18:56:12 UTC Created: 2026-03-17 18:55:49 UTC Check it out on Icann lookup.icann.org/en #ufotwitter #uapX #aliens Thanks to: reddit.com/user/thelazt1/

ART
18
11
78
12.8K
ExtremePaperClip 리트윗함
Mark Gadala-Maria
Mark Gadala-Maria@markgadala·
We have reached peak AI. Someone made an entire short film "Harry Potter by Balenciaga" Credit: demonflyingfox on YT
English
280
1K
8.7K
1.1M
ExtremePaperClip
ExtremePaperClip@ExtremePaperC·
@SwiftOnSecurity I love your book collection. If you haven’t yet read these, I highly recommend them: Shogun (James Clavell) The Wager (David Grann) The Wright Brothers (David McCullough)
English
0
0
1
216
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
My home repairs are now largely complete, how a new bookshelf to be my new home office video background. Still waiting for rest of books from storage
SwiftOnSecurity tweet mediaSwiftOnSecurity tweet mediaSwiftOnSecurity tweet mediaSwiftOnSecurity tweet media
English
23
6
154
12.6K
gabsmashh
gabsmashh@gabsmashh·
my grandma passed a week and a half ago and i just wanted to share why i've been scarce. she is one of the strongest people i've known and i am so lucky to have grown up getting to look up to her. i miss her a lot.
gabsmashh tweet mediagabsmashh tweet mediagabsmashh tweet media
English
94
8
531
10.2K
ExtremePaperClip 리트윗함
Tom Waits (ANTI-)
Tom Waits (ANTI-)@tomwaits·
Waits adopts a guttural, drill-sergeant bark for this raw, visceral, and deeply empathetic look at the human cost of war. The video, directed by Matt Mahurin, is a haunting masterpiece of dark surrealism. youtube.com/watch?v=0Fju9o…
YouTube video
YouTube
English
4
123
472
33.9K
ExtremePaperClip
ExtremePaperClip@ExtremePaperC·
Typewriters and sketchpads… stored in safes… buried in concrete? Remember Gene Spafford: "The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards — and even then I have my doubts."
STÖK ✌️@stokfredrik

Iets talk about ai data processing and vulnerability research. I understand this challenge quite well, it comes down to compliance, risk and data processing, but I find it exponentially harder to avoid any kind of third party processing in today’s age, let’s say one uses Google Docs to keep notes or write a report and use gemeni for spell checking, or use slack, windows, a modern ide, or even perform a search, etc. etc, they all have ai features and telemetrics enabled and built in. When it comes to data processing using ai the end user can in some cases control this by having an enterprise agreement with zero logging and zero data retention activated on ex Claude code. But it comes at a much higher price tier, and I highly doubt most will adapt to that setup. Then we have the fact that most foundation models live in the us. Which have its own complications. This it’s definitely a question I have pondered and not 100% sure on how to solve or even avoid. My approach is to guard the data as much as I can with the knowledge I have and use services where I can opt out from training and be selective with what I process and how and use local Models for some task. But tbh I think it’s a conversation of the past. If the thing you are processing have been in the internet (public facing) then it’s already in the datasets. And is code or vulns even IP these days? when more and more teams produce code on the fly. What are your opinions? can we solve this?

English
0
0
2
73
ExtremePaperClip 리트윗함
MG
MG@_MG_·
This is likely snake oil, but tons of people are boosting it. Ultrasonic mic jammers are real & a fraction of the price. What they claim is new: using AI to detect mics. There are ways to find hidden mics. The TSCM space (bug sweepers) has tons of tricks that seem like pure magic. Have you ever listened to transistors turn on & off inside of an electronic device? Seen what a non-wireless camera sensor sees from across the room because every copper trace on a PCB is still an antenna? …I have 😎. Hell, the first time I heard the “heat beat” of one of my naughty little OMG Cables, it was kinda reminiscent of hearing the heartbeat of my literal unborn kids! 😂 … anyway, you also have thermals, magnetics, etc. But most of these tricks require that you either sweep a detection device within a few cm of the bug, or you have a bulky antenna pointed directly at the bug. This “Deveillance” device is a small stationary puck that you place in the center of the space you want to protect. So what can you do with a small stationary object to detect mics? Well, anyone who’s used an ultrasonic jammer knows that most of the space is going to be filled with ultrasonic emitters, especially if you want the claimed 2 meter range. So that leaves a pretty small space for the detection electronics. You could do wireless protocol discovery. WiFi, BLE, etc. This would be easy. But it’ll only find a fraction of hidden mics. You could do wideband RF sweeps to detect any active radio emissions. Here, AI could actually help identify based on raw signal. But this already feels like a stretch for this product. Lots of legit wireless mics are going to slip through the cracks with the minimal hardware that fits in a small puck. But let’s say we make it this far. What about every mic that is not actively transmitting? Saving to local storage for later retrieval, etc. Well, you could use your ultrasonic emitters to create saturated pulses into the mics, which in turn will create electrical impulses down the copper lines between the mic & whatever catches the signal. Every bit of copper, no matter the length, is also an antenna. So you catch those emissions and look for signals that match your own ultrasonic emissions. Packing equipment sensitive enough to do this inside a little puck though…. Ehhhh And after all that, you are still blind to passive MEMS microphones. And more so: there are already ways to defeat ultrasonic jammers too. However, this device doesn’t claim to protect you against bugs and other hidden mics. It’s very tightly constrained to: “prevents smart devices and AI recorders from picking up your voice” That’s an incredibly narrow scope. Existing ultrasonic jammers cover that scope pretty easily.
Aida Baradari@aidaxbaradari

Today, we're introducing Spectre I, the first smart device to stop unwanted audio recordings. We live in a world of always-on listening devices. Smart devices and AI dominate our world in business and private conversations. With Deveillance, you will @be_inaudible.

English
43
216
1.7K
129.9K
ExtremePaperClip 리트윗함
Andy Greenberg (@agreenberg at the other places)
A full iOS exploit toolkit, "Coruna," has been found in the wild, hacking iPhones that visited infected websites, used by Russian spies targeting Ukrainians and thieves targeting Chinese crypto holders. And it may have been created for the US government. wired.com/story/coruna-i…
English
8
313
722
99.6K
ExtremePaperClip
ExtremePaperClip@ExtremePaperC·
@MalwareJake The HAT and the SMILE tells me that you are doing GREAT! Life is good, pal! (Moment to Moment)
English
1
0
1
118
Jake Williams
Jake Williams@MalwareJake·
I'm in full mid life crisis mode. But on the plus side, I just got this glorious hat.
Jake Williams tweet media
English
13
4
130
4.9K
Hasan Toor
Hasan Toor@hasantoxr·
🚨BREAKING: The "Ollama for voice cloning" just dropped. It's called Voicebox and it clones any voice from just a few seconds of audio entirely on your machine. No ElevenLabs subscription. No cloud uploads. No voice data leaving your device. It's powered by Qwen3-TTS, Alibaba's breakthrough voice model. → Upload a few seconds of audio → Get a near-perfect voice clone → Generate speech in any language → Mix multi-voice conversations in a DAW-like timeline editor All running locally. Zero cloud dependency. But it's not just a TTS wrapper. It's a full voice production studio: → Multi-track timeline editor for podcasts and dialogues → System audio capture + Whisper transcription built in → Voice prompt caching for instant regeneration → Built with Tauri (Rust), not Electron 10x smaller, native performance 100% Opensource. MIT Licensed. macOS + Windows available now. Linux coming soon. This is the moment voice cloning leaves the cloud and runs on your desktop. Link in the first comment.
Hasan Toor tweet media
English
165
809
5.8K
432.9K
ExtremePaperClip 리트윗함
Dave Kennedy
Dave Kennedy@HackingDave·
Just released a new tool that scans for Bluetooth devices including Bluetooth Low Energy (BLE) devices. It will scan for all, filtered by MAC, or if you have the Identity Resolving Keys (IRK), can be used to determine the Resolvable Private Address (RPA). Works on MacOS, Windows, and Linux. github.com/HackingDave/bt… #TrustedSec #BinaryDefense
English
22
125
663
78.5K
ExtremePaperClip
ExtremePaperClip@ExtremePaperC·
@reprise_99 Sysmon wins, tho. Really. Even if folks just enable sending Sysmon events 1, 3, 11, and 22 to their SIEM. At least do that, folks. Tune out the noise (every environment is different). If you take time to get to know your data - tuning gets easy.
English
0
0
2
73
Matt Zorich
Matt Zorich@reprise_99·
Happy International Enable Process Auditing & Sysmon Day! The most exciting day on the cyber calendar is with us once more. Every year this day rolls around I am no less excited. What a time to celebrate too, with native Sysmon functionality coming to Windows this year! Why would you enable these over and above your other security tools? The below FAQ has you covered. github.com/reprise99/4688…
Matt Zorich tweet media
English
1
6
34
2.2K
ExtremePaperClip
ExtremePaperClip@ExtremePaperC·
@jsark983 Before the pen test - run Ping Castle or Purple Knight, and then work to remediate those findings. Seriously. For additional wins: Sprinkle some honey in your AD (with alerts). Then you can tell the pen tester “come at me”
GIF
English
1
0
1
92
Joe (GonzoSec) 🇺🇸🇺🇦
Possibly unpopular opinion but idc: Running a commercial vuln scanner during an internal pen test is no longer acceptable unless a client insists. Fight me.
English
7
0
10
3K
JNS
JNS@_devJNS·
"Claude usage limit reached. Your limit will reset at 7am"
English
146
307
4K
173.2K
ExtremePaperClip
ExtremePaperClip@ExtremePaperC·
So much good stuff packed in here for Incident Response! Thanks, BHIS!
Black Hills Information Security@BHinfoSecurity

🚨 It’s back! 🚨 The INFOSEC SURVIVAL GUIDE has returned! Read our FREE Orange Book: Incident Response below or at the link here -- blackhillsinfosec.com/prompt-zine/pr… In the United States? Get a physical copy shipped to you for FREE -- spearphish-general-store.myshopify.com/products/the-i… If you loved our Yellow and Green book or it's your first time hearing about our survival guides — now’s your chance. If you didn’t… you already know why this one’s worth grabbing. 🟧💥

English
0
0
1
51