RBN

2.2K posts

RBN banner
RBN

RBN

@0xRobin

SOC & Web3 | $BTC & Stocks | Die Gedanken sind frei

Katılım Ağustos 2009
337 Takip Edilen129 Takipçiler
Sabitlenmiş Tweet
RBN
RBN@0xRobin·
Zoom out.
English
0
0
5
520
RBN retweetledi
Perplexity
Perplexity@perplexity_ai·
Today we're open-sourcing Bumblebee, a read-only scanner for macOS and Linux. It checks developer machines for risky packages, extensions, and AI tool configs. Connected to Computer, it can trigger deeper scans whenever a new supply-chain risk emerges. github.com/perplexityai/b…
Perplexity tweet media
English
144
577
4.1K
1M
RBN
RBN@0xRobin·
Hinweis: Bei Telegram sind die regulären „Cloud Chats" standardmäßig nicht Ende-zu-Ende-verschlüsselt – die Verschlüsselungsschlüssel verbleiben bei Telegram selbst. Das gilt auch für Gruppenchats und Kanäle: Diese werden nie mit E2EE geschützt.
Pavel Durov@durov

WhatsApp encryption is a giant fraud. The state of Texas just sued WhatsApp for lying to users about privacy — because WhatsApp employees have access to “virtually all” private messages. Now we know what WhatsApp’s founder meant when he said he “sold his users’ privacy.”

Deutsch
0
0
0
8
RBN
RBN@0xRobin·
@durov Then enable encryption by default; otherwise this post makes no sense.
English
0
0
0
5
Pavel Durov
Pavel Durov@durov·
WhatsApp encryption is a giant fraud. The state of Texas just sued WhatsApp for lying to users about privacy — because WhatsApp employees have access to “virtually all” private messages. Now we know what WhatsApp’s founder meant when he said he “sold his users’ privacy.”
English
1.2K
5.1K
22.3K
905.8K
RBN retweetledi
Socket
Socket@SocketSecurity·
🚨 Supply chain attack on the Laravel Lang organization: 700+ historical versions across multiple community-maintained Laravel Lang packages were compromised with an RCE backdoor, including: laravel-lang/lang laravel-lang/http-statuses laravel-lang/attributes Laravel-Lang/actions The payload targets cloud creds, CI/CD secrets, Kubernetes tokens, Vault, browser data, password managers, SSH keys, and more.
Socket tweet media
English
54
271
1.1K
667.1K
RBN
RBN@0xRobin·
@tomwarren Even better advice, stop using WhatsApp 😬
English
0
0
0
12
RBN
RBN@0xRobin·
@k1rallik Yeah, they did a good job hunting those cheaters, but I would never install such software on my computer.
English
0
0
0
35
BuBBliK
BuBBliK@k1rallik·
> be Riot > 2014 anti-cheat team is 3 guys > legacy system Packman barely works > 2020 ship Vanguard, kernel-level, on boot > internet calls it a Chinese rootkit > ship it anyway > ban 3.6M Valorant cheaters in 4 years > one ban every 37 seconds > 2024 force it onto League, 175K bans in months > scripting drops below 1% for the first time in 4 years > Elysium, Oasys, Zeitgeist all shut down > May 22 2026 flip IOMMU on DMA rigs, they blue-screen mid-match > tweet "congrats on your $6k paperweight" a Tencent rootkit just bricked a $6,000 wallhack rig and the only people mad are the guys who bought one
Riot Games@riotgames

Well, that escalated quickly. There’s been a wave of claims by cheaters about Vanguard “bricking” their PCs, so let’s clear that up: Vanguard does not damage hardware or disable your devices. The photo we posted is a picture of cheat hardware devices that are sold explicitly for cheating in VALORANT (not normal PCs or PC components). Through our latest updates, Vanguard now makes those devices worthless for VAL, but does not in any way brick PCs or PC components or PC software. Our latest update enforces standard platform security features, like the Input-Output Memory Management Unit (IOMMU), on accounts identified as using Direct Memory Access (DMA) cheating devices. These protections are already part of modern systems and when enabled, they block DMA cheat devices (such as those shown in the photo) from accessing memory in downstream applications, like our games. If a cheat setup continues attempting to cheat after those protections are enabled, the system may generate hardware faults or instability. This is expected behavior under IOMMU when attempts are made to read protected memory. Disabling IOMMU allows the cheat device to function again, but IOMMU will still be required to play our games. This means the cheat device won’t work with our games, but your PC isn’t “bricked.” We would not, and cannot, impact your PC’s functionality in any other fashion. This functionality only applies to systems attempting to use DMA cheat devices, and players who are not using DMA-based cheat setups are not affected. We’ll keep investing in anti-cheat to protect competitive integrity, and we’ll keep being as transparent as possible about how those systems work.

English
222
711
20K
3.8M
RBN retweetledi
xAI
xAI@xai·
You can now use your @grok or X Premium subscription in @opencode. Use the model powering Grok Build for high speed and codebase intelligence. x.ai/news/grok-open…
xAI tweet media
English
440
473
4.1K
1.2M
RBN retweetledi
Bubblemaps
Bubblemaps@bubblemaps·
ALERT: 🚨 Polymarket contract exploited Attackers are removing 5,000 $POL every 30 seconds – $600k stolen so far Pause all Polymarket activity for now
Bubblemaps tweet media
English
394
395
2.4K
986.4K
RBN
RBN@0xRobin·
@AyakaMods How can people still use Google like they didn't know what the risks are? They just don't care until they get rekt...
English
0
0
0
10
AyakaMods
AyakaMods@AyakaMods·
Google just permanently banned a manga artist’s entire Google account, just for uploading his own old manga files to Drive. AI moderation triggered and flagged it, he tried to submit appeal then he got rejected it by Google and now he has lost everything like Gmail, Drive, all linked services is gone. He never even sharing the files publicly, it’s only backing up his own a private work like any creator and artists. This is Google Drive “AI moderation” in action. No human support and no serious to take action. Physical storage or real private alternatives only. Support the artists getting screwed by this. This level of corporate overreach is insane.
AyakaMods tweet media
糸杉柾宏@『寝取り魔法使いの冒険』第1第3 月曜更新@masahiroitosugi

ところで恥を忍んで告白するのですが、私、Googleから垢BANされました。昔描いた漫画のデータをドライブにアップしている時に警告が出て、再審査請求も却下され、見事垢BAN。 まじで、困るよ。いろんなサイトやサービスにGoogleアカウントを使っていたので。 良い子のみんなには関係ないかもしれないけど、「俺、良い子…かな?」って人は気をつけてくれよな!

English
737
9.2K
50.9K
5.2M
RBN retweetledi
Watcher.Guru
Watcher.Guru@WatcherGuru·
JUST IN: 🇰🇷 South Korea considers abolishing planned 22% crypto tax.
English
367
756
7.5K
673K
RBN retweetledi
Socket
Socket@SocketSecurity·
npm nuked every granular access token that bypasses 2FA after another Mini Shai-Hulud wave compromised hundreds of packages. Good news: staged publishing is now in public preview. socket.dev/blog/npm-inval… #NodeJS #JavaScript
English
8
27
142
10.7K
RBN
RBN@0xRobin·
@hrrcnes The big problem is trust my friend 🫠
English
0
0
0
368
hurricane
hurricane@hrrcnes·
🚨 çinde şu an manyak bir olay dönüyor çinli öğrenciler gpt 5.5 ve opus 4.7'ye bizden %97 daha ucuza erişmenin bir yolunu bulmuşlar Xianyu/Taobao gibi grey marketplacelerde satılan unofficial api'ler ile kuruşlar harcayarak milyonlarca token yakıyorlar başka bir seviye..
hurricane tweet media
Vaishnavi@_vmlops

CHINESE DEVS ARE BURNING 100M+ GPT-5.4 TOKENS FOR ~$1/DAY ▫️ they buy api access from resellers who exploit cheap regional subscriptions at massive scale ▫️ gpt costs them 3% of official price. claude costs more because anthropic made it harder to crack ▫️ when pirates can undercut you by 97%, your pricing model is the real problem

Türkçe
37
77
934
1.3M
RBN
RBN@0xRobin·
current mood 🫣
RBN tweet media
English
0
0
0
3
RBN
RBN@0xRobin·
@marcfriedrich Es sind beide nicht mehr salonfähig 😅
Deutsch
0
0
0
108
RBN retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🔒 If you use durabletask (or any recently updated PyPI/npm packages): • Treat any machine that imported v1.4.1–1.4.3 as compromised • Rotate ALL cloud creds, SSH keys, Vault tokens, 1Password/Bitwarden • Scan for the worm’s C2 domains GitHub says no customer data impact yet, but stay ahead of the curve. Thread end. Stay safe.
English
2
8
46
18.7K
RBN
RBN@0xRobin·
GitHub wurde kompromittiert – durch eine bösartige VS Code Extension, die den Laptop eines Mitarbeiters infiziert hat. Erneut ein klassisches Beispiel dafür, wie unscheinbare Tools zur größten Schwachstelle werden können.
Deutsch
0
0
0
21
RBN retweetledi
GitHub
GitHub@github·
We are investigating unauthorized access to GitHub’s internal repositories. While we currently have no evidence of impact to customer information stored outside of GitHub’s internal repositories (such as our customers’ enterprises, organizations, and repositories), we are closely monitoring our infrastructure for follow-on activity.
English
1.7K
5.4K
25.5K
13.6M
RBN retweetledi
Socket
Socket@SocketSecurity·
🚨 BREAKING: Socket is investigating an active npm supply chain attack compromising hundreds of packages in the @antv ecosystem. The malicious publish wave appears tied to Mini Shai-Hulud and packages connected to the npm maintainer account atool.
Socket tweet media
English
53
262
1.1K
596.5K
RBN
RBN@0xRobin·
@Samaytwt depends on the use case.
English
0
0
0
7
Samay
Samay@Samaytwt·
Bro disappeared like it never existed.
Samay tweet media
English
188
11
694
87K