jackmaltese
134 posts

jackmaltese
@jackmaltese
domador de caballos marino



Quick PSA: Someone is attacking Tor right now and has been for a few weeks. The attacker is spoofing the IPs of Tor Exit and Directory nodes, and blasting TCP SYN packets indiscriminately on 22/TCP- spurring a large amount of abuse complaints to hosting providers, which are then temp blocking/banning Tor infrastructure which isn't actually doing anything wrong. For the time being, I recommend all hosting providers *ignore* abuse complaints that indicate "SSH scanning" or "port scanning on 22/TCP" and originate from any of the following IPs: pastebin.com/idKU0agt This is a clever attack. I'm working with partners to triangulate the true origin of this traffic then try to get it disconnected. Weird attacker website here: r00t.monster Related links: gitlab.torproject.org/tpo/network-he… lists.torproject.org/pipermail/tor-…

Hola @torproject! We stumbled into a very weird issue! Mac OSX 15.01, latest update (AMD and M1). TOR latest update 14.0.1, running w/ and w/o @ProtonVPN with secure core (intl &/or domestic routing): we cannot access a specific onion. Same with Kali, latest stable build. On Mac, downgraded to TOR 13.5.9, running w/ and w/o #ProtonVPN with secure core (intl &/or domestic routing): we are now able to access that specific onion. Hiccups happen, gents, tho this is kinda weird 🤣 Any clue about? @sonoclaudio




🚨 UPDATE CrowdStrike Outage BSOD impacts millions: banking services, transportations (@Ryanair, Delta, trains), hospitals, energy suppliers and tons more of supply chainers. ⚠️ Remediations only via physical machine operation 1 - boot machine into Safe Mode or in the Windows Recovery Environment 2 - navigate to: C:\Windows\System32\drivers\CrowdStrike 3 - locate file “C-00000291*.sys” and delete it






























