"We’ve been saying this for years now, and we’re going to keep saying it until the message finally sinks in: mandatory age verification creates massive, centralized honeypots of sensitive biometric data that will inevitably be breached. Every single time. And every single time it happens, the politicians who mandated these systems and the companies that built them act shocked—shocked!—that collecting enormous databases of government IDs, facial scans, and biometric data from millions of people turns out to be a security nightmare."
"We’ve been saying this for years now, and we’re going to keep saying it until the message finally sinks in: mandatory age verification creates massive, centralized honeypots of sensitive biometric data that will inevitably be breached. Every single time. And every single time it happens, the politicians who mandated these systems and the companies that built them act shocked—shocked!—that collecting enormous databases of government IDs, facial scans, and biometric data from millions of people turns out to be a security nightmare."
🐛 NEW SECURITY CONTENT 🐛
📱 iOS and iPadOS 15.8.7 - 4 bugs fixed
https://support.apple.com/en-us/126632
📱 iOS and iPadOS 16.7.15 - 1 bug fixed
https://support.apple.com/en-us/126646
🐛 NEW SECURITY CONTENT 🐛
📱 iOS and iPadOS 15.8.7 - 4 bugs fixed
https://support.apple.com/en-us/126632
📱 iOS and iPadOS 16.7.15 - 1 bug fixed
https://support.apple.com/en-us/126646
NotDoor Insights: A Closer Look at Outlook Macros and More | Splunk
Pulse ID: 69b18fed69f535b5abb5d95b
Pulse Link: https://otx.alienvault.com/pulse/69b18fed69f535b5abb5d95b
Pulse Author: CyberHunter_NL
Created: 2026-03-11 15:53:17
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #InfoSec #Mac #OTX #OpenThreatExchange #Outlook #bot #CyberHunter_NL
NotDoor Insights: A Closer Look at Outlook Macros and More | Splunk
Pulse ID: 69b18fed69f535b5abb5d95b
Pulse Link: https://otx.alienvault.com/pulse/69b18fed69f535b5abb5d95b
Pulse Author: CyberHunter_NL
Created: 2026-03-11 15:53:17
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #InfoSec #Mac #OTX #OpenThreatExchange #Outlook #bot #CyberHunter_NL
Valse CleanMyMac-website installeert SHub Stealer en backdoors voor cryptovaluta-wallets | Malwarebytes
Pulse ID: 69b175e015961402a9e5f335
Pulse Link: https://otx.alienvault.com/pulse/69b175e015961402a9e5f335
Pulse Author: CyberHunter_NL
Created: 2026-03-11 14:02:08
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #InfoSec #Mac #MalWareBytes #Malware #OTX #OpenThreatExchange #bot #CyberHunter_NL
Valse CleanMyMac-website installeert SHub Stealer en backdoors voor cryptovaluta-wallets | Malwarebytes
Pulse ID: 69b175e015961402a9e5f335
Pulse Link: https://otx.alienvault.com/pulse/69b175e015961402a9e5f335
Pulse Author: CyberHunter_NL
Created: 2026-03-11 14:02:08
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #InfoSec #Mac #MalWareBytes #Malware #OTX #OpenThreatExchange #bot #CyberHunter_NL
🐛 NEW SECURITY CONTENT 🐛
💻 macOS Tahoe 26.3.2 - no CVE entries
🐛 NEW SECURITY CONTENT 🐛
💻 macOS Tahoe 26.3.2 - no CVE entries
New “Coruna” iOS exploit kit shows how fast spy‑grade hacks become mass cybercrime. Likely leaked from a U.S. framework, it used 23 bugs across iOS 13–17.2.1 in campaigns from Ukraine to Chinese scam sites. 🔗 https://zurl.co/ywNqR #cybersecurity #iOS #mobilesecurity #infosec
New “Coruna” iOS exploit kit shows how fast spy‑grade hacks become mass cybercrime. Likely leaked from a U.S. framework, it used 23 bugs across iOS 13–17.2.1 in campaigns from Ukraine to Chinese scam sites. 🔗 https://zurl.co/ywNqR #cybersecurity #iOS #mobilesecurity #infosec
My reservations and criticism re: #Signal are not just valid, but the reality is even worse than I thought:
- The fact that @signalapp requires not only their shitty #Android #App, and a #PhoneNumber but literally won't allow people to use their shitty #Desktop-App unless they have an Android device with a camera pointed at it makes it utterly unuseable for certain users who don't have a fucking #camera in their Android…
Seriously, do they expect folks to deal with that shit?
It's already worse in terms of #UX than #telegram and #discord and that too makes #XMPP+#OMEMO clients like @monocles / #monoclesChat & @gajim / #gajim easier and faster to onboard #TechIlliterates onto.
Whichever asshole decided that a replacement for #SMS should mandate #PII like a #PhoneNumber & not be natively cross-platform should be banned from doing any #tech in their life. Trying to circumvent this shit and helping folks with it makes me so fucking angry that I'm now explicitly refusing to support it!
FIX THAT SHIT, @Mer__edith, and if it means you need to kick some devs in their crouch then consider this a necessary "investment"…
#sarcasm #TechSupport #TapesFromTechSupport #Enshittifucation #SignalSucks #TelegramSucks #Messengers
@lackthereof no, it's not because unlike #Phones and #PhoneNumbers, #eMail is not necessarily traceable by circumstances.
- Because a Phone "Line" (regardless of whether it's POTS, ISDN, VoIP, GSM, VoLTE, …) and #telephony in general are designed for realtime communication, they inherently necessitate an active, ongoing connection.
- Even if it's just some App/PBX/… to connect to the provider and constantly state "I am on the network and able to recieve calls!" (with PSTN networks, there a physical line that gets assumed to have a phone connected)…
Whereas with eMail (and any #asynchronous #communication) you don't have that requirement.
- So unless the provider is being taken over or otherwise "cooperative" there's no means for a sender to know where, when and how a message was retrieved unless the recipient wants the sender to know of it!
- Besides, even if you don't have an eMail provider like
cock.liwhich natively supports @torproject / #Tor useage with an #OnionService, unless said provider explicitly prevents you from doing so, you can use not just Tor but also other techniques to make it extremely hard (not necessarily impossible, but at least unfeasible at scale!) to get tracked down. - In fact, you could even use #Sneakernet - Style distribution through " #MeatProxies" and #DeadDrops (aka. #dr0p) to further twart tracing attempts.
- Besides, even if you don't have an eMail provider like
Or to put it simple:
- You can ring up someone and thus circumstantially verify the chain of #PhoneNumber -> #IMSI -> #ICCID -> #SIM -> #IMEI -> Device -> Location -> Owner quite quickly.
So either way a phone number is just a horrible means of doing that.
- And don't even get me started on the fact that legally speaking noone truly owns their number.
- Because even if you got some spechal case number (like UPT was) you still depend on neither regulators nor telcos to not block or otherwise interfere with it. Which is in contrast to say an
OnionServicewhich can only be shutdown effectively by sabotage aka. (more or less figurately) "unplugging" it.
- Because even if you got some spechal case number (like UPT was) you still depend on neither regulators nor telcos to not block or otherwise interfere with it. Which is in contrast to say an
I mean, it's not as if I didn't gave @signalapp a fair chance.
- I wanted #Signal to be good - honestly...
- But I'm old enough that things rarely are that simple as #TechPopulism & #Propaganda claim it to be.
- Just like 5th grade #SexEd is not a substitute for Endocrinology, Gynecology and Andrology and actually licensed, medical professionals.
So any #Messenger service that requires a #Phone Number for signup and/or useage is truly not a real replacement and inherently makes PROVEN WRONG assumptions [i.e. that it is legal and possible to obtain a phone number anonymously at someone's juristiction] about it's customers' ability to shield their privacy…
- Cuz all the " #Metadata" claims of Signal are complete #MarketingLies by virtue of them storing a Phone Number and not just being (as per admission by @Mer__edith) 'hard locked-in' with #aws but also subject to #CloudAct.
- They certainly are nit deploying real #E2EE cuz you neither get #SelfCustody nor #SelfHosting and have to blindly trust them (aka. " #TrustMeBro!") that what they release as #SourceCode is actually what they deploy.
- It's like all those " #VPN" shillings which one cannot verify to be true or false!
THIS is why I am going fucking ballistic on #TechPopulism aiming at #TechIlliterates because it's spreading a "false sense of #security" whilst completely disregarding absolute fundamentals when it comes to the underlying systems.
- And I don't mean shit like #Govware of the #SS7 kind, but absolute basics in #ITsec, #InfoSec, #OpSec & #ComSec that every @cryptoparty@chaos.social / @cryptoparty@mastodon.earth / #CryptoParty worth it's name touches on.
- Signal can't and won't save peoples' asses and the sooner we realize that "complex problems are hard to fix" the less we waste Resources on #HoneyPots that stench like #CrytpoAG & #ANØM!
@kkarhan
Email is, in practice, a privacy shit show equal to or greater than phone numbers. Either you self-host, which means you have an isp and a DNS provider at minimum who can reveal your identity on their whims, even if you lie on a whois record. Or you use one of the mega free providers with all their conflicts of interest and data mining. Or you use a paid provider which opens up all the payment chain to trace back to you on top of everything else
To get a phone number I can walk to the corner convenience store and, with cash payment and no ID, purchase a prepaid SIM card. I can pay cash to refill it every month.
My reservations and criticism re: #Signal are not just valid, but the reality is even worse than I thought:
- The fact that @signalapp requires not only their shitty #Android #App, and a #PhoneNumber but literally won't allow people to use their shitty #Desktop-App unless they have an Android device with a camera pointed at it makes it utterly unuseable for certain users who don't have a fucking #camera in their Android…
Seriously, do they expect folks to deal with that shit?
It's already worse in terms of #UX than #telegram and #discord and that too makes #XMPP+#OMEMO clients like @monocles / #monoclesChat & @gajim / #gajim easier and faster to onboard #TechIlliterates onto.
Whichever asshole decided that a replacement for #SMS should mandate #PII like a #PhoneNumber & not be natively cross-platform should be banned from doing any #tech in their life. Trying to circumvent this shit and helping folks with it makes me so fucking angry that I'm now explicitly refusing to support it!
FIX THAT SHIT, @Mer__edith, and if it means you need to kick some devs in their crouch then consider this a necessary "investment"…
#sarcasm #TechSupport #TapesFromTechSupport #Enshittifucation #SignalSucks #TelegramSucks #Messengers
@lackthereof no, it's not because unlike #Phones and #PhoneNumbers, #eMail is not necessarily traceable by circumstances.
- Because a Phone "Line" (regardless of whether it's POTS, ISDN, VoIP, GSM, VoLTE, …) and #telephony in general are designed for realtime communication, they inherently necessitate an active, ongoing connection.
- Even if it's just some App/PBX/… to connect to the provider and constantly state "I am on the network and able to recieve calls!" (with PSTN networks, there a physical line that gets assumed to have a phone connected)…
Whereas with eMail (and any #asynchronous #communication) you don't have that requirement.
- So unless the provider is being taken over or otherwise "cooperative" there's no means for a sender to know where, when and how a message was retrieved unless the recipient wants the sender to know of it!
- Besides, even if you don't have an eMail provider like
cock.liwhich natively supports @torproject / #Tor useage with an #OnionService, unless said provider explicitly prevents you from doing so, you can use not just Tor but also other techniques to make it extremely hard (not necessarily impossible, but at least unfeasible at scale!) to get tracked down. - In fact, you could even use #Sneakernet - Style distribution through " #MeatProxies" and #DeadDrops (aka. #dr0p) to further twart tracing attempts.
- Besides, even if you don't have an eMail provider like
Or to put it simple:
- You can ring up someone and thus circumstantially verify the chain of #PhoneNumber -> #IMSI -> #ICCID -> #SIM -> #IMEI -> Device -> Location -> Owner quite quickly.
So either way a phone number is just a horrible means of doing that.
- And don't even get me started on the fact that legally speaking noone truly owns their number.
- Because even if you got some spechal case number (like UPT was) you still depend on neither regulators nor telcos to not block or otherwise interfere with it. Which is in contrast to say an
OnionServicewhich can only be shutdown effectively by sabotage aka. (more or less figurately) "unplugging" it.
- Because even if you got some spechal case number (like UPT was) you still depend on neither regulators nor telcos to not block or otherwise interfere with it. Which is in contrast to say an
I mean, it's not as if I didn't gave @signalapp a fair chance.
- I wanted #Signal to be good - honestly...
- But I'm old enough that things rarely are that simple as #TechPopulism & #Propaganda claim it to be.
- Just like 5th grade #SexEd is not a substitute for Endocrinology, Gynecology and Andrology and actually licensed, medical professionals.
So any #Messenger service that requires a #Phone Number for signup and/or useage is truly not a real replacement and inherently makes PROVEN WRONG assumptions [i.e. that it is legal and possible to obtain a phone number anonymously at someone's juristiction] about it's customers' ability to shield their privacy…
- Cuz all the " #Metadata" claims of Signal are complete #MarketingLies by virtue of them storing a Phone Number and not just being (as per admission by @Mer__edith) 'hard locked-in' with #aws but also subject to #CloudAct.
- They certainly are nit deploying real #E2EE cuz you neither get #SelfCustody nor #SelfHosting and have to blindly trust them (aka. " #TrustMeBro!") that what they release as #SourceCode is actually what they deploy.
- It's like all those " #VPN" shillings which one cannot verify to be true or false!
THIS is why I am going fucking ballistic on #TechPopulism aiming at #TechIlliterates because it's spreading a "false sense of #security" whilst completely disregarding absolute fundamentals when it comes to the underlying systems.
- And I don't mean shit like #Govware of the #SS7 kind, but absolute basics in #ITsec, #InfoSec, #OpSec & #ComSec that every @cryptoparty@chaos.social / @cryptoparty@mastodon.earth / #CryptoParty worth it's name touches on.
- Signal can't and won't save peoples' asses and the sooner we realize that "complex problems are hard to fix" the less we waste Resources on #HoneyPots that stench like #CrytpoAG & #ANØM!
Fake CleanMyMac Site Spreads SHub Stealer Targeting Crypto Wallets
Threat actors were observed targeting cryptocurrency wallets through a
fake CleanMyMac website distributing SHub Stealer malware. The campaign uses a phishing technique that prompts users to paste a command into the Terminal, which initiates the malware. Once executed, the malware steals browser data such as saved passwords, cookies and autofill information also targets cryptocurrency wallet data.
Pulse ID: 69af64c1b2d211fb43d4d899
Pulse Link: https://otx.alienvault.com/pulse/69af64c1b2d211fb43d4d899
Pulse Author: cryptocti
Created: 2026-03-10 00:24:33
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cookies #CyberSecurity #InfoSec #Mac #Malware #OTX #OpenThreatExchange #Password #Passwords #Phishing #Word #bot #cryptocurrency #cryptocti
Fake CleanMyMac Site Spreads SHub Stealer Targeting Crypto Wallets
Threat actors were observed targeting cryptocurrency wallets through a
fake CleanMyMac website distributing SHub Stealer malware. The campaign uses a phishing technique that prompts users to paste a command into the Terminal, which initiates the malware. Once executed, the malware steals browser data such as saved passwords, cookies and autofill information also targets cryptocurrency wallet data.
Pulse ID: 69af64c1b2d211fb43d4d899
Pulse Link: https://otx.alienvault.com/pulse/69af64c1b2d211fb43d4d899
Pulse Author: cryptocti
Created: 2026-03-10 00:24:33
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cookies #CyberSecurity #InfoSec #Mac #Malware #OTX #OpenThreatExchange #Password #Passwords #Phishing #Word #bot #cryptocurrency #cryptocti
Fake CleanMyMac site installs SHub Stealer and backdoors crypto wallets
Pulse ID: 69af46e2aca26f57f198051b
Pulse Link: https://otx.alienvault.com/pulse/69af46e2aca26f57f198051b
Pulse Author: Tr1sa111
Created: 2026-03-09 22:17:06
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #InfoSec #Mac #OTX #OpenThreatExchange #bot #Tr1sa111
Fake CleanMyMac site installs SHub Stealer and backdoors crypto wallets
Pulse ID: 69af46e2aca26f57f198051b
Pulse Link: https://otx.alienvault.com/pulse/69af46e2aca26f57f198051b
Pulse Author: Tr1sa111
Created: 2026-03-09 22:17:06
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #InfoSec #Mac #OTX #OpenThreatExchange #bot #Tr1sa111
Your Phone Number Can Reveal Everything #infosec #numbers #iphone #android #cybersecurityawareness #cybernaumad
Your Phone Number Can Reveal Everything #infosec #numbers #iphone #android #cybersecurityawareness #cybernaumad