Skip to content
  • About Us
  • Contact Us
  • PGP Key
  • Add anything here or just remove it...
Oak Lawn 2600Oak Lawn 2600
  • Home
  • Updates
  • Links
  • RSS
  • News
  • Join Discord!

DEFCONConference

This is the official DEF CON YouTube channel.
What is DEF CON? Check out https://www.defcon.org/

We'll be posting videos and pictures from past conferences here, starting with DEF CON 20 and working backwards. If you have a DEF CON related video you want us to include in this channel please email us / fb / tweet and we'll get it added.

Please remember, all content is copyright DEF CON Communications, Inc. You can share it for educational purposes, but you can not make _any_ money from doing so. If you do that would be a violation of the copyright as well as the spirit of DEF CON.

DEFCONConference
DEF CON 33 Recon Village - How to Become One of Them: Deep Cover Ops - Sean Jones, Kaloyan Ivanov
DEF CON 33 Recon Village - Inside the Shadows Tracking RaaS Groups, Cyber Threats - John Dilgen
DEF CON 33 Recon Village - Autonomous Video Hunter AI Agents for Real Time OSINT - Kevin Dela Rosa
DEF CON 33 Recon Village - A Playbook for Integration Servers - Ryan Bonner, Guðmundur Karlsson
DEF CON 33 Recon Village - Mapping the Shadow War From Estonia to Ukraine - Evgueni Erchov
DEF CON 33 Recon Village - Building Local Knowledge Graphs for OSINT - Donald Pellegrino

Louis Rossmann

Contact:
youtube@rossmanngroup.com - Louis reads this.
For cases where a company has taken part in anti-consumer practices, PLEASE ADD TO https://consumerrights.wiki !

I started as a studio repair technician at Avatar & started a Macbook component level logic board repair business. This channel shows repair & data recovery work & shows how to perform these repairs step by step. There are many things that make it hard to fix things now; willful actions from manufacturers to limit access to parts & schematics. I talked about this to try and spark mainstream recognition of the "Right to Repair" movement.

Restrictions placed on repair were just a canary-in the-coal-mine for many of the anti-ownership, anti-consumer practices that would become common in every industry, which I discuss & try to push back against every day.

If you need data recovery: rossmanngroup.com For macbook board repair advice: boards.rossmanngroup.com

Louis Rossmann
SEND A LETTER HERE: https://www.repairact.com/drivers
https://www.autocare.org/news/latest-news/details/2024/04/10/survey-84-of-independent-repair-shops-view-vehicle-data-access-as-top-issue-for-their-business


https://www.facebook.com/p/RevUp-America-61577268421421/
https://www.congress.gov/118/bills/hr906/BILLS-118hr906ih.pdf
https://www.youtube.com/watch?v=1kgSZewrsy0
https://www.youtube.com/watch?v=seyvYETWf34
https://consumerrights.wiki/w/General_Motors_data_collection_and_sharing_controversy
https://consumerrights.wiki/w/BMW_API_restrictions#Past_data_security_incidents
Car companies collect your data, sell it to insurers, then claim repair shops are the privacy threat
https://fox11online.com/news/crime/menasha-police-officer-accused-of-using-license-plate-recognition-system-to-track-his-ex-girlfriend-cristian-morales-misconduct-in-office-flock-domestic-abuse-restraining-order-cash-bond

https://alpr.watch/

https://consumerrights.wiki/w/Common_Questions,_Arguments,_%26_Responses_when_discussing_Flock_Surveillance

https://consumerrights.wiki/w/Flock_license_plate_readers

https://www.texasstandard.org/stories/flock-safety-cameras-houston-police-texas-investigation-crime-use/

https://deflock.me/
Stalking your ex is SO much easier now!
https://gothamist.com/news/nyc-wegmans-is-storing-biometric-data-on-shoppers-eyes-voices-and-faces

https://web.archive.org/web/20250120131517/https://rossmanngroup.com/dca-license-number-citations-not-feeling-like-much-of-a-cultivated-garden-right-now/

https://alpr.watch/

https://www.youtube.com/playlist?list=PLkVbIsAWN2lvzWirQsz6haGEjJ2b2e6Ho

https://www.youtube.com/playlist?list=PLkVbIsAWN2ls-WXrvFtAxoJ_VZIMSG9Z3
Wegman's biometric data collection and a general NYC rant
https://consumerrights.wiki/w/Bose_kills_SoundTouch_and_speakers_lose_smart_functionality#cite_note-8
https://www.youtube.com/watch?v=IHYfBtmei3o
https://www.bose.com/soundtouch-end-of-life
https://assets.bosecreative.com/m/496577402d128874/original/SoundTouch-Web-API.pdf
Bose employees deserve a big thank you for respecting ownership!
Original Video: https://youtu.be/y9yYAWWrbm4
Texas Bill SB2420: https://capitol.texas.gov/tlodocs/89R/billtext/pdf/SB02420F.pdf#navpanes=0
Federal Court Ruling: https://storage.courtlistener.com/recap/gov.uscourts.txwd.1172869998/gov.uscourts.txwd.1172869998.65.0.pdf

Help Contribute to https://consumerrights.wiki
Add Article Descriptions: https://consumerrights.wiki/w/Projects:Cargo-complete
Archive Links: https://consumerrights.wiki/w/Projects:Archive_everything
Get Involved: https://consumerrights.wiki/w/Projects:Hub
Judge shuts down horrible Texas age verification law
https://www.msn.com/es-cl/noticias/other/diputados-reactivan-proyecto-de-ley-para-combatir-la-pirater%C3%ADa-y-elevar-los-est%C3%A1ndares-que-exige-el-tlc-con-estados-unidos/ar-AA1TebpN

https://www.youtube.com/playlist?list=PLkVbIsAWN2lsMqrDlhT3XjLrAhqIDk-eK
United States exports "you'll own nothing and be happy" to Chile - don't let this law pass

EFForg

The Electronic Frontier Foundation is dedicated to ensuring that technology supports freedom, justice, and innovation for all the people of the world. Founded in 1990, we champion Internet privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development for the public good.

EFForg
Flock contracts have quietly spread to cities across the country. But Flock ALPR (Automated License Plate Readers) erode civil liberties from the moment they're installed. While officials claim these cameras keep neighborhoods safe, the evidence tells a different story. The data reveals how Flock has enabled surveillance of people seeking abortions, protesters exercising First Amendment rights, and communities targeted by discriminatory policing. 

This is exactly why cities are saying no. From Austin to Cambridge to small towns across Texas, jurisdictions are rejecting Flock contracts altogether, proving that surveillance isn't inevitable—it's a choice.  

Join our panel to explore what's happening as Flock contracts face growing resistance across the U.S. We'll break down the legal implications of the data these systems collect, examine campaigns that have successfully stopped Flock deployments, and discuss the real-world consequences for people's privacy and freedom.
EFFecting Change: Get the Flock Out of Our City
Age-gating mandates are reshaping the internet in ways that are invasive, dangerous, and deeply unnecessary. But users are not powerless! We can challenge these laws, protect our digital rights, and build a safer digital world for all internet users, no matter their ages.

Learn more at EFF.org/Age.

#ageverification #agemandates #agegating #privacy #digitalsecurity #internet
Age Verification Won't Make the Internet Safer
The audio companion to EFF's EFFector newsletter for December 2025. To read EFFector with links to full articles, visit https://eff.org/effector/37/18.

Become an EFF member today! You can join for as little as $5/month when you sign up at https://eff.org/effect.
EFFector 37.18 | 🪪 Age Verification Is Coming for the Internet
Recorded on April 23, 2025. 
This year's Bay Area Members' Speakeasy had EFF's Maddie Daly and Chao Jun Liu giving a behind-the-scenes look at the policy questions and legislative efforts that will shape the next stage of digital rights for all. 

Want to get invited to EFF's Members' Speakeasy events? Support our work today at https://eff.org/join
EFF's 2025 Bay Area Members' Speakeasy
Age verification mandates are spreading fast, and they’re ushering in a new age of online surveillance, censorship, and exclusion for everyone—not just young people. Age-gating laws generally require websites and apps to collect sensitive data from every user, often through invasive tools like ID checks, biometric scans, or other dubious “estimation” methods, before granting them access to certain content or services. Lawmakers tout these laws as the silver-bullet solution to “kids’ online safety,” but in reality, age-verification mandates wall off large swaths of the web, build sweeping new surveillance infrastructure, increase the risk of data breaches and real-life privacy harms, and threaten the anonymity that has long allowed people to seek support, explore new ideas, and organize and build community online.
EFFecting Change: The Human Cost of Online Age Verification
We always hear about the death of journalism. But a few groups of people are fighting back and modeling a new path forward for journalism. We speak to Jason Koebler of 404 Media and David Roth of Defector about what they've learned and what challenges they're facing now.
Gate Crashing | Episode 3: A New Path for Journalism | Jason Koebler and David Roth

Black Hat

Black Hat is the most technical and relevant information security event series in the world. For more than 25 years, Black Hat Briefings have provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.

From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, providing a premier venue for elite security researchers and trainers to find their audience.

Black Hat
The macOS threat landscape has changed considerably in recent years with the ever-increasing prevalence of macOS malware. In response, Apple has expanded the capabilities of XProtect by introducing new features such as XProtect Remediator (XPR) and XProtect Behavior Service. XPR periodically scans to remove malware and restores infected devices. However, due to a lack of detailed reverse engineering efforts, its detection or remediation capabilities remain unclear.

In this presentation, we share our reverse engineering results of XPR. Since XPR binaries are stripped Swift binaries, the detailed analysis was challenging. We developed custom tools for static and dynamic analysis of Swift binaries, which allowed us to perform a thorough investigation. Our analysis uncovered intriguing detection logics that go beyond the previously known simple scanning using YARA rules. These include a creative mechanism that employs OCR to detect malware performing a Gatekeeper bypass. Furthermore, our examination revealed Apple-exclusive threat intelligence, including information related to malware believed to be the TriangleDB macOS implants. Remarkably, we discovered that XPR's detection logic is described with a custom DSL using Swift Result Builders—the same technology that powers SwiftUI's declarative syntax. Our analysis of the DSL demonstrated that it significantly helps in understanding the details of XPR's detection logic.

In addition, we revealed a novel mechanism—Provenance Sandbox—that XPR uses to track the origin of remediated files. This provenance information serves as a valuable forensic artifact even for third-party security vendors.

This presentation provides valuable insights into XPR internals for blue teams working on macOS security. The tools being introduced will help security researchers analyze future XPR updates to obtain Apple's threat intelligence included in XPR. Additionally, information on XPR vulnerabilities and Provenance Sandbox bypasses will benefit red teams.

By:
Koh Nakagawa  |  Security Researcher, FFRI Security, Inc.

Presentation Materials Available at:
https://blackhat.com/us-25/briefings/schedule/?#xunprotect-reverse-engineering-macos-xprotect-remediator-44791
XUnprotect: Reverse Engineering macOS XProtect Remediator
Apple's on device AI frameworks CoreML, Vision, AVFoundation enable powerful automation and advanced media processing. However, these same capabilities introduce a stealthy attack surface that allows for payload execution, covert data exchange, and fully AI assisted command and control operations.

This talk introduces MLArc, a CoreML based C2 framework that abuses Apple AI processing pipeline for payload embedding, execution, and real time attacker controlled communication. By leveraging machine learning models, image processing APIs, and macOS native AI features, attackers can establish a fully functional AI assisted C2 without relying on traditional execution mechanisms or external dependencies.

Beyond MLArc as a standalone C2, this talk explores how Apple's AI frameworks can be weaponized to enhance existing C2s like Mythic, providing stealthy AI assisted payload delivery, execution, and persistence. This includes the below list of Apple AI framework used for embedding Apfell Payload.
CoreML - Embedding and executing encrypted shellcode inside AI models.
Vision - Concealing payloads/encryption keys inside AI processed images and retrieving them dynamically to bypass detection.
AVFoundation - Hiding and extracting payloads within high frequency AI enhanced audio files using steganographic techniques.

This research marks the first public disclosure of Apple AI assisted payload execution and AI driven C2 on macOS, revealing a new class of offensive tradecraft that weaponizes Apple AI pipelines for adversarial operations. I will demonstrate MLArc in action, showing how Apple's AI stack can be abused to establish fileless, stealthy C2 channels that evade traditional security measures.

This talk is highly technical, delivering new research and attack techniques that impact macOS security, Apple AI exploitation, and red team tradecraft.

By:
Hariharan Shanmugam  |  Lead Red Teamer

Full Session Details Available at: 
https://blackhat.com/us-25/briefings/schedule/?#weaponizing-apple-ai-for-offensive-operations-44700
Weaponizing Apple AI for Offensive Operations
OPC UA is a standardized communication protocol that is widely used in the areas of industrial automation and IoT. It is used within and between OT networks, but also as a bridge between IT and OT environments or to connect field systems with the cloud. Traditionally, VPN tunnels are used to secure connections between OT trust zones (especially when they cross the internet), but this is often considered not to be necessary when using OPC UA because the protocol offers its own cryptographic authentication and transport security layer.

This makes OPC UA a valuable target for attackers, because if they could hijack a (potentially internet-exposed) OPC UA server they might be able to wreak havoc on whatever industrial systems are controlled by it. Therefore, I decided to take a look at the cryptography used by the protocol, and whether any protocol-level flaws could be used to compromise implementations.

As a result, I managed to identify two protocol flaws that I could turn into practical authentication bypass attacks that worked against various implementations and configurations. These attacks involve signing oracles, signature spoofing padding oracles and turning "RSA-ECB" into a "timing side channel amplifier".

In this talk, I will explore the protocols and the issues I identified, as well as the process of turning two theoretical crypto flaws into highly practical exploits.

By:
Tom Tervoort  |  Principal Security Specialist, Bureau Veritas Cybersecurity

Presentation Materials Available at:
https://blackhat.com/us-25/briefings/schedule/?#no-vpn-needed-cryptographic-attacks-against-the-opc-ua-protocol-44760
No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol
As web applications evolve, so do their data processing pipelines—handling Unicode normalization, encoding, and translation before storing or executing user input. But what if these same data transformations could be weaponized by attackers? This talk exposes how Unicode normalization flaws (such as visual confusables/best-fit mappings, truncation/overflows, case-mappings and entity decodings) lead to critical security bypasses—allowing attackers to evade WAFs, input filters, and backend logic to execute Remote Code Execution (RCE), Cross-Site Scripting (XSS), Server-Side Template Injection (SSTI), Open Redirects, and HTTP Response Splitting.

Using real-world attack data from Akamai's research team, this session will showcase live exploitation demos, explore the impact of vulnerabilities like CVE-2024-4577 (PHP-CGI Argument Injection), and introduce cutting-edge Unicode fuzzing techniques. Attendees will leave with a deep understanding of Unicode security pitfalls and hands-on tools like Shazzer, recollapse, and Burp Activescan++ enhancements to detect these issues.

By:
Ryan Barnett  |  Principal Security Researcher, Akamai
Isabella Barnett  |  Cyber Security Engineering Student,  

Presentation Materials Available at:
https://blackhat.com/us-25/briefings/schedule/?#lost-in-translation-exploiting-unicode-normalization-44923
Lost in Translation: Exploiting Unicode Normalization
Gaining initial access to an intranet is one of the most challenging parts of red teaming. If an attack chain is intercepted by an incident response team, the entire operation must be restarted. In this talk, we introduce a technique for gaining initial access to an intranet that does not involve phishing, exploiting public-facing applications, or having a valid account. Instead, we leverage the use of stateless tunnels, such as GRE and VxLAN, which are widely used by companies like Cloudflare and Amazon. This technique affects not only Cloudflare's customers but also other companies.

Additionally, we will share evasion techniques that take advantage of company intranets that do not implement source IP filtering, preventing IR teams from intercepting the full attack chain. Red teamers could confidently perform password spraying within an internal network without worrying about losing a compromised foothold.

Also, we will reveal a nightmare of VxLAN in Linux Kernel and RouterOS. This affects many companies, including ISPs. This feature is enabled by default and allows anyone to hijack the entire tunnel, granting intranet access, even if the VxLAN is configured on a private IP interface through an encrypted tunnel. What's worse, RouterOS users cannot disable this feature. This problem can be triggered simply by following the basic VxLAN official tutorial. Furthermore, if the tunnel runs routing protocols like BGP or OSPF, it can lead to the hijacking of internal IPs, which could result in domain compromises. We will demonstrate the attack vectors that red teamers can exploit after hijacking a tunnel or compromising a router by manipulating the routing protocols.

Lastly, we will conclude the presentation by showing how companies can mitigate these vulnerabilities. Red teamers can use these techniques and tools to scan targets and access company intranets. This approach opens new avenues for further research.

By:
Shu-Hao Tung  |  Threat Researcher, Trend Micro

Presentation Materials Available at:
https://blackhat.com/us-25/briefings/schedule/index.html#from-spoofing-to-tunneling-new-red-teams-networking-techniques-for-initial-access-and-evasion-44678
From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion
Diving into Windows HTTP: Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services (PRE-RECORDED)

The Windows operating system heavily relies on HTTP services. Numerous Windows HTTP services such as IIS, ADFS, ADCS, Hyper-V, Kerberos, WSUS, Windows Storage, SSDP, UPnP, WinRM, RDP, BranchCache and MSMQ are widely deployed and play a crucial role in supporting various core functions within the Windows ecosystem. Although the security of Windows HTTP services is of utmost importance, almost no related security research has been made public in the past. Based on this gap, we decided to dive into the security of Windows HTTP Services and discovered many new things!

After conducting an in-depth analysis of the internal mechanisms of Windows HTTP components, we discovered many novel vulnerability patterns in Windows HTTP services over the past year. These include not only classic memory corruption bugs but also a large number of logical bugs caused by the incorrect usage of Windows HTTP APIs by developers. Our research has identified more than 100 critical pre-auth vulnerabilities in almost all key services, including IIS, ADFS, ADCS, Hyper-V, Kerberos, WSUS, Windows Storage, SSDP, UPnP, WinRM, RDP, BranchCache and MSMQ. These vulnerabilities cover a wide range of issues, including pre-auth remote code execution (RCE), information leakage, and denial-of-service (DoS). Importantly, exploiting these vulnerabilities requires no credentials, no additional configurations, and no user interaction (0-click), which means that any Windows system running them is at risk.

In this presentation, we will discuss the different architectures of Windows HTTP services and share multiple previously undisclosed vulnerability cases and attacks. We will also summarize these new vulnerability patterns and provide a comprehensive interpretation of the security threats within the realm of Windows HTTP services.

By:
Qibo Shi  |  Senior Security Researcher, Cyber Kunlun Lab
Victor V  |  Senior Security Researcher, Cyber Kunlun Lab
Wei Xiao  |  Senior Security Researcher, Cyber Kunlun Lab
Zhiniang Peng  |  Associate Professor, Huazhong University of Science and Technology

Presentation Materials Available at:
https://blackhat.com/us-25/briefings/schedule/?#diving-into-windows-http-unveiling-hidden-preauth-vulnerabilities-in-windows-http-services-pre-recorded-44873
Diving into Windows HTTP: Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services

TechLead

Ex-Google / Meta tech lead, app entrepreneur, software engineer. ☕️ 👌

TechLead
Ex-Google / ex-Meta TechLead exposes the dark truth of H1B visa abuse. Clip from my new livestream:
https://pump.fun/coin/4xobQBtd2wpYh6dCGTbAJKb9yBuiexUs3FGA95QVpump
https://x.com/techleadhd/

Ace your coding interviews with ex-Google/ex-Facebook training. https://techinterviewpro.com/
💻 Get access to 100+ programming interview problems explained: https://coderpro.com/
💻 I’ll send you FREE daily coding interview questions to practice your skills: http://dailyinterviewpro.com/

🌕 TechLead Coin ($TL) https://fame.fun/techleadhd
💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
🛒 My computer and camera gear: https://www.amazon.com/shop/techlead/list/UVRWWQKBFRR

Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd

This description may contain affiliate links.
H-1B VISA ABUSE: The Dark Truth of Tech (as an ex-Google software engineer)
Ex-Google TechLead on coding in the attention economy, status game, and abundance mindset. 
- EtherFi 3% Crypto Card: https://www.ether.fi/refer/87b2b9c7

Ace your coding interviews with ex-Google/ex-Facebook training. https://techinterviewpro.com/
💻 Get access to 100+ programming interview problems explained: https://coderpro.com/
💻 I’ll send you FREE daily coding interview questions to practice your skills: http://dailyinterviewpro.com/

🌕 TechLead Coin ($TL) https://fame.fun/techleadhd
💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
🛒 My computer and camera gear: https://www.amazon.com/shop/techlead/list/UVRWWQKBFRR

Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd

This description may contain affiliate links.n
Why Programming Will Make You POOR (Coding in 2025)
Ex-Google TechLead on why working more isn't the answer. Video links:
- EtherFi 3% Crypto Card: https://www.ether.fi/refer/87b2b9c7
- Robinhood crypto, get a free stock: https://join.robinhood.com/patrics3834

Ace your coding interviews with ex-Google/ex-Facebook training. https://techinterviewpro.com/
💻 Get access to 100+ programming interview problems explained: https://coderpro.com/
💻 I’ll send you FREE daily coding interview questions to practice your skills: http://dailyinterviewpro.com/

🌕 TechLead Coin ($TL) https://fame.fun/techleadhd
💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
🛒 My computer and camera gear: https://www.amazon.com/shop/techlead/list/UVRWWQKBFRR

Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd

This description may contain affiliate links.
Why WORK won't make you RICH (Bitcoin, Ethereum, Market Update)
Ex-Google TechLead gets out of tech. Limited Time: 2% crypto deposit match on Robinhood app. Get a free stock 🎁: https://join.robinhood.com/patrics3834

Ace your coding interviews with ex-Google/ex-Facebook training. https://techinterviewpro.com/
💻 Get access to 100+ programming interview problems explained: https://coderpro.com/
💻 I’ll send you FREE daily coding interview questions to practice your skills: http://dailyinterviewpro.com/

🌕 TechLead Coin ($TL) https://fame.fun/techleadhd
💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
🛒 My computer and camera gear: https://www.amazon.com/shop/techlead/list/UVRWWQKBFRR

Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd

This description may contain affiliate links.
Get Out of Tech. IT'S OVER.
Earn yield on Bitcoin. Own assets, borrow fiat.
🚀 Bitcoin 2025 Conference in Las Vegas (May 27 - 29), use code "TECHLEAD" for 10% OFF. https://tickets.b.tc/event/bitcoin-2025?promoCodeTask=apply&promoCodeInput=TECHLEAD (ticket prices go up soon, RSVP early)

Coinbase (get $20 free): https://coinbase.com/join/AG8JM99
Robinhood (get a free stock): https://join.robinhood.com/patrics3834
(Not an ad, not sponsored. These are just my referral links if you want a free sign-up bonus.)

💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd
Bitcoin Yield: How to earn passive income, borrow against Bitcoin.
It's not about if you own Bitcoin, it's about how much. Crypto & how to get rich in 2025. Not financial advice.

💵 Merch! The ultra-thin TechLead wallet: https://amzn.to/42UyYOb
Follow me on social media:
https://x.com/techleadhd
https://instagram.com/techleadhd
How much Bitcoin should you own? | STATE OF CRYPTO 2025.

Eli the Computer Guy

Eli the Computer Guy
Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
ChatGPT Traffic Drops 30% Because of Google Gemini - OpenAI is Failing
Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
Tailwind CSS Lays off 75% of Engineers Due to Brutal AI - or... 3 People Fired Because CEO Sucks...
Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
NVIDIA Demands China Pay for H200 AI GPU's Upfront - No Refund If Chinese Government Bans Chips
Code and Workbook on GitHub -- https://github.com/SiliconDojo/In-Person-Classes/tree/main/AI%20At%20the%20Edge%20with%20Raspberry%20Pi

Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
AI At the Edge with Raspberry Pi
Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
China Blocking Meta Buying Manu AI - Chinese Angry at American Threats
Support Content at - https://donorbox.org/etcg
LinkedIn at - https://www.linkedin.com/in/eli-etherton-a15362211/
NVIDIA Releases Open Source Physical AI Models for Robots - Jensen Huang Destroys Tesla

Channel2600

The official video channel of 2600: The Hacker Quarterly

Channel2600
Listener email, hactivist deletes white supremacist websites live on stage, Vietnam to force YouTube to allow skipping ads, social media "addiction" warnings, AI manipulated images, Public Domain Day, Sony patents AI "ghost player".
Off The Hook - Wed, 07 Jan 2026 19:00:00 EST
Emmanuel and Kyle are at the Chaos Communications Congress and already in 2026, banned items at NYC Mayoral Inauguration, kids at CCC, Alex is in London, greetings from the Chelsea Arts Club, CCC talks are available online.
Off The Hook - Wed, 31 Dec 2025 19:00:00 EST
Alex is in Florida, Gila is on the mend, redacted info in Epstein files easily recovered, segment pulled from 60 Minutes airs in Canada, 83 million music files scraped from Spotify, documenting ICE license plates.
Off The Hook - Wed, 24 Dec 2025 19:00:00 EST
Emmanuel and Kyle are away on assignment, a medical emergency, trains cancelled over fake bridge collapse image, unremovable Copilot on LG TVs, Firefox will become a "modern AI browser", Amazon pulls AI-powered recaps from Prime Video.
Off The Hook - Wed, 17 Dec 2025 19:00:00 EST
A post-show stream designed to take listener phone calls off-air and online. The show itself airs from 7 to 8 pm ET on WBAI 99.5 FM in New York City. www.2600.com/offthehook
Off The Hook Overtime 2025-12-03
NYC tree lighting ceremony, new Twitter features, age verification laws.
Off The Hook - Wed, 03 Dec 2025 19:00:00 EST

Jack Rhysider

I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.

Check out our clips channel @DarknetDiariesClips.

I am NOT on Telegram.

Jack Rhysider
In the 1970s and '80s, the Internet was home to rebels, phreakers, and knowledge seekers - that is until phone companies and governments brought the hammer down on kids sharing BBS text files.

But one organized group of hackers, The Legion of Doom, emerged from the chaos of the early Internet. And their adventures made history.

Visit https://darknetdiaries.com/episode/168/ for a list of sources, full transcripts, and to listen to all episodes.
The Secret Phone Numbers That Unlocked the Entire Network 📞 Darknet Diaries Ep. 168: LoD
A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by Threatlocker.

This episode is sponsored by ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Visit https://darknetdiaries.com/episode/#167 for a list of sources, full transcripts, and to listen to all episodes.

#sponsored
Default to Deny: Why Network Security Is Shifting to "Zero Trust" ⛔ Ep. 167 ThreatLocker
Maxie Reynolds has held many jobs: underwater roboticist, Hollywood stunt performer, quantum computing engineer. But her *favorite* line of work — the one that REALLY gets her blood pumping — is penetration testing, especially the IRL kind.

Maxie shares how a new wardrobe, a bad Swedish accent, and a TON of adrenaline are the best tools for hacking companies, governments, and the security teams that are supposed to protect them.

Visit https://darknetdiaries.com/episode/166/ for a list of sources, full transcripts, and to listen to all episodes.

Support the show and get bonus episodes: https://plus.darknetdiaries.com/

Or get a sweet t-shirt with official Darknet Diaries artwork: https://shop.darknetdiaries.com/
There's No Way Into This Tech Company's Server Room ... Except Through the Sewer💧Episode 166: Maxie
Tanya Janca's worldview changed suddenly when she realized how easy it was for hackers to crack her applications. From that point on, she vowed to be both a developer AND a hacker, and to spread the gospel of application security to other programmers.

But when she took a job with the Canadian government, nothing could prepare her for the looming threats.

Visit https://darknetdiaries.com/episode/165/ for a list of sources, full transcripts, and to listen to all episodes.
"The Building Has Malware." Adventures in Appsec 🕷 Darknet Diaries Ep. 165: Tanya
He started small, swiping cards, buying gift cards, and cashing out. It spiraled into a full‑blown criminal enterprise. Dozens of co‑conspirators, stacks of stolen plastic, and a lifestyle built on chaos.

Meet Nathan Michael, leader of Oak Cliff Swipers.

Visit https://darknetdiaries.com/episode/164/ for a list of sources, full transcripts, and to listen to all episodes.
"I was addicted to making money." Confessions of a Chronic Card Skimmer 💳 Ep. 164: Oak Cliff Swipers
In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador with no evidence and no motive. But what's really going on goes far deeper than he could imagine.

Visit https://darknetdiaries.com/episode/163/ for a list of sources, full transcripts, and to listen to all episodes.
He Was Arrested as a Russian Hacker, But The Truth Is Far Scarier ☠ Darknet Diaries Ep. 163: Ola

media.ccc.de

The real official channel of the chaos computer club, operated by the CCC VOC (https://c3voc.de)

If you are missing a talk from a CCC event, you might find it already at media.ccc.de as we currently experiment with delayed publication on YouTube.

Comments on videos are typically disabled as we do not have resources for proper moderation. If you actually want to reach the speakers we recommend to reach out via the contact details on their lecture slides.

media.ccc.de
Der Hype um künstliche Intelligenz ist allgegenwärtig. Selbst Donald Trump postet KI-generierte Videos, in denen er sich wahlweise als Rockstar oder Kampfjetpilot inszeniert. Elon Musk prahlte öffentlich damit, dass in seinem "Department of Goverment Efficiency" der soziale Kahlschlag mit Unterstützung Künstlicher Intelligenz vorangetrieben wird. Und Peter Thiel meint allen ernstes, KI-Regulierung und das Erscheinen des Antichristen gingen Hand in Hand. Müssen wir uns Sorgen machen?

Rainer Mühlhoff ist Professor für Ethik und kritische Theorien der Künstlichen Intelligenz an der Universität Osnabrück. In seinem kürzlich erschienen Buch "Künstliche Intelligenz und der neue Faschismus" setzt er sich kritisch mit dem KI-Hype auseinander. Und er erklärt, welche toxischen Ideologien zentraler Akteure aus dem Silicon Valley Menschen empfänglich für autoritäre Gesellschaftsbilder machen.

Wir sprechen über die Zyklen von KI-Hypes, das problematische Narrativ vom "Bürokratieabbau durch AI" und die Funktion apokalyptischer Zukunftsvisionen. Vor allem aber will ich von Rainer wissen: Welche Bedeutung haben bei dieser Debatte die in Teilen des Silicon Valley einflussreichen ideologischen Strömungen – von radikalem Cyberlibertarismus über Longtermismus bis hin zum "Dark Enlightment"?

Katharina Nocun

https://events.ccc.de/congress/2025/hub/event/detail/denkangebot-rainer-mhlhoff-ber-ki-und-autoritre-sehnschte-im-silicon-valley

#39c3

Licensed to the public under http://creativecommons.org/licenses/by/4.0
39C3 - Denkangebot: Rainer Mühlhoff über KI und autoritäre Sehnsüchte im Silicon Valley
https://media.ccc.de/v/39c3-cracking-open-what-makes-apple-s-low-latency-wifi-so-fast

This talk presents Apple's link-layer protocol Low-Latency WiFi and how it achieves its real-time capabilities to enable Continuity features like Sidecar Display and Continuity Camera. We make more kernel logging available on iOS and build a log aggregator that combines and aligns system- and network-level log sources from iOS and macOS.

Apple's Continuity features make up a big part of their walled garden. From AirDrop and Handoff to AirPlay, they all connect macOS and iOS devices wirelessly. In recent years, security researchers have opened up several of these features showing that the Apple ecosystem is technically compatible with third-party devices.

In this talk, we present the internal workings of Low-Latency WiFi (LLW) – Apple's link-layer protocol for several real-time Continuity features like Continuity Camera and Sidecar Display. We talk about the concepts behind LLW, how it achieves its low-latency requirement and how we got there in the reverse engineering process.

We also present the tooling we built to enable more kernel-level tracing and logging on iOS through a reimplementation of cctool from macOS and the source code of trace that was buried deep inside of Apple’s open-source repository system_cmds. We build a log aggregator that combines various kernel- and user-space traces, log messages and pcap files from both iOS and macOS into a single file and finally investigate the network stack on Apple platforms that is implemented in both user- and kernel space. There we find interesting configuration values of LLW that make it the go-to link-layer protocol for Apple's proprietary real-time Continuity applications.

Henri Jäger

https://events.ccc.de/congress/2025/hub/event/detail/cracking-open-what-makes-apple-s-low-latency-wifi-so-fast

#39c3 #Hardware

Licensed to the public under http://creativecommons.org/licenses/by/4.0
39C3 - Cracking open what makes Apple's Low-Latency WiFi so fast
https://media.ccc.de/v/39c3-live-die-repeat-the-fight-against-data-retention-and-boundless-access-to-data

Both within the EU as well as nationally in Germany, there exists a renewed drive to implement data retention, a practice struck down by the ECJ and discontinued in many national legislations. In parallel, cross-border access to stored data has been mandated within the EU as “e-evidence”, and will soon be extended to 90+ countries under the umbrella of the EU cybercrime convention. In principle, all data stored by service providers will be available to law enforcement as part of a criminal investigation. The timing of both initiatives is not coincidental, as access to data naturally relies on the availability of data.
The talk will address the state of play on data retention in various legislations, and introduce the practice of cross border access to stored data by law enforcement as well as its shortcomings and threats to privacy and confidentiality.

The Specter of Data Retention is back in the political arena, both as a harmonized, EU-wide approach as well as being part of the coalition agreement of the new German national government. Other countries have already recently implemented new data retention laws, i.e. Belgium or Denmark. 
In parallel, access to all types of stored data – and not only data stored under a data retention regime – by law enforcement has been radically reformed by groundbreaking new legislation, undermining both exiting national safeguards as well as protections implemented by businesses aiming for a higher standard in cyber security and data protection.  
The talk will give an overview on recent developments for a harmonized “minimum” approach to data retention under the Polish and Danish EU presidency as well as the new German legislation currently under consideration. 
It will introduce the upcoming international release mechanisms for stored data under the e-evidence legislation, the 2nd protocol to the EU cybercrime convention as well as future threats from the UN cybercrime convention. 
It will address how a cross-border request for information works in practice, which types of data can be requested by whom, and who will be responsible for the few remaining safeguards – including an analysis of the threat model and potential “side channel” attacks by cybercrime to gain access to basically all data stored by and with service providers.

Klaus Landefeld

https://events.ccc.de/congress/2025/hub/event/detail/live-die-repeat-the-fight-against-data-retention-and-boundless-access-to-data

#39c3 #EthicsSocietyPolitics

Licensed to the public under http://creativecommons.org/licenses/by/4.0
39C3 - Live, Die, Repeat: The fight against data retention and boundless access to data
https://media.ccc.de/v/39c3-suing-spyware-in-europe-news-from-the-front

In 2022, CitizenLab contacted a member of the Spanish non-profit Irídia to tell them that one of their members had likely been hacked with Pegasus spyware. The target, a lawyer, had been spied on by the Spanish government in 2020 because he represented a Catalan politician who was in prison. His phone was infected with Pegasus during the COVID-19 lockdown, on the same day he was having an online meeting with other lawyers working on the case.

Irídia and the lawyer (Andreu) decided to take the case to court. A few years later, he met with Data Rights and invited them to join forces and bring in partners from across Europe to increase the impact. This collaboration led to the creation of the PEGA coalition in May 2025.

This talk goes over the status of the case and work we have done across Europe to bring spyware use in court.

Despite the European Parliament’s PEGA investigation in 2023, spyware scandals in Europe continue to grow, with little real action to stop or address them. Many EU countries were — or still are — clients of the world’s major spyware companies. As a result, nothing changes except the number of victims targeted by these technologies. Worst, offices or clients in the EU is useful for spyware companies' sales pitch. So, the EU is a growing hub for this ominous ecosystem! With no real political will to act, members of the PEGA investigation say the only hope for change is to take these cases to court — and that’s exactly the path we’ve chosen!

Irídia’s case is one of the flagship cases in the EU, both for its depth and for what it has achieved so far. We will review the current status and implications of the case, examining issues that range from state responsibility to the role of the spyware company behind Pegasus — in its creation, sale, and export — which maintains a strong presence within the EU.

After that, we will take a step back to look at what is happening across Europe. We will highlight the most significant cases currently moving forward, as well as some of the PEGA coalition’s strategies for driving accountability, strengthening safeguards, and ensuring remedies. The coalition’s mission goes beyond legal action — it aims to prevent the devastating impact of spyware and push for systemic change.

Lori Roussey, Celia/Irídia

https://events.ccc.de/congress/2025/hub/event/detail/suing-spyware-in-europe-news-from-the-front

#39c3 #EthicsSocietyPolitics

Licensed to the public under http://creativecommons.org/licenses/by/4.0
39C3 - Suing spyware in Europe: news from the front!
https://media.ccc.de/v/39c3-auf-die-dauer-hilft-nur-power-herausforderungen-fur-dezentrale-netzwerke-aus-sicht-der-soziologie

Der Vortrag diskutiert Herausforderungen dezentraler Netzwerke aus soziologischer Perspektive. Als dezentrale Netzwerke werden technische Infrastrukturen verstanden, die nicht von einer zentralen Autorität, sondern verteilt über Instanzen zur Verfügung gestellt werden. Nutzer:innen profitieren von dieser Infrastruktur, nutzen beispielsweise das Fediverse oder das Tor-Netzwerk, ohne zur Infrastruktur beizutragen. Zugleich können dezentrale Netzwerke nur dann bestehen, wenn hinreichende Ressourcen von Personen oder Organisationen mobilisiert werden, um das Netzwerk überhaupt zur Verfügung zu stellen. Dies führt zur originären Instabilität dezentraler Netzwerke, wenn nicht der Weg der Kommodifizierung des Nutzer:innenverhaltens eingeschlagen wird. Aufbauend auf dieser Zustandsbeschreibung, werden Bedingungen erörtert, um Kollektivgüter wie dezentrale Netzwerke organisatorisch (und nicht technisch) herzustellen. Hierzu zählen Partizipation oder die Idee einer öffentlichen Grundfinanzierung. Der Vortrag wird neben soziologischen Ideen und harten Zahlen auch durch eine ordentliche Portion Idealismus zu Fragen der Souveränität und Autonomität in der Digitalisierung motiviert.

Die Soziologie hat immer etwas mitzuteilen, sobald Fragen kollektiven Handelns auftreten. Dies gilt sowohl für soziale wie auch digitale Räume. So hat der Soziologe Peter Kollock bereits in den 1990er Jahren festgestellt, „the Internet is filled with junk and jerks“ (Kollock, 1999, S. 220). Gegenwärtig dürfte die Mehrheit dieser Aussage anstandslos zustimmen. Aber dies ist nicht der entscheidende Punkt, sondern die weitere Beobachtung: „Given that online interaction is relatively anonymous, that there is no central authority, and that it is difficult or impossible to impose monetary or physical sanctions on someone, it is striking that the Internet is not literally a war of all against all” (1999, S. 220).

Die Welt kennt inzwischen zahlreiche Gegenbeispiele, bei denen Autoritäten das Internet nutzen, um das Nutzungsverhalten zu monetarisieren oder Überwachungstechnologien zur Sanktionierung einsetzen (Zuboff, 2019). Diese Ausgangslage beziehe ich in meiner Forschung ein, wenn ich dezentrale Netzwerke wie das Fediverse oder das Tor-Netzwerk aus soziologischer Perspektive betrachte. In erster Linie bin ich daran interessiert zu verstehen, wie dezentrale Netzwerke – organisatorisch nicht technisch – entstehen und welche Herausforderungen es dabei zu überwinden gilt (Sanders & Van Dijck, 2025). Eine zentrale Motivation orientiert sich an der Frage, wie ein Internet ohne zentrale Autorität, verringert von Marktabhängigkeiten, resilient gegenüber Sanktionsmechanismen und Souverän bezüglich eigener Daten, aufgebaut werden kann. Motiviert durch diesen präskriptiven Rahmen, betrachte ich im Vortrag die Herausforderungen zunächst deskriptiv und beziehe meine soziologische Perspektive ein. Denn in der Regel profitieren Menschen, die einen Vorteil aus der Realisierung eines bestimmten Ziels ziehen, unabhängig davon, ob sie persönlich einen Anteil der Kooperation tragen – oder eben nicht. Das kollektive Handeln fällt mitunter schwer, obwohl oder gerade, weil ein begründetes kollektives Interesse zur Umsetzung eines bestimmten Zieles besteht. Gleiche Interessen sind nicht gleichbedeutend mit gemeinsamen Interessen. Diese Situationsbeschreibung ist vielfältig anwendbar von WG-Aufräumplänen bis zu Fragen der klimaneutralen Transformation. Der Grund ist, dass kollektives Handeln ein Mindestmaß an Zeit, Aufwand oder Geld verursacht, sodass vielfach ein Trittbrettfahren gewählt wird in der Hoffnung, dass immer noch genug andere kooperieren, um das gewünschte Ziel zu erreichen (Hardin, 1982).

Aus dieser Perspektive betrachte ich dezentrale Netzwerke. So kann das Fediverse oder der Tor-Browser genutzt werden, ohne eine eigene Instanz oder Knoten zu hosten. Dies ist auch nicht das Ziel der genannten dezentralen Netzwerke. Dennoch: Die Kosten und der Aufwand für die technische Infrastruktur müssen von einem kleinen Teil getragen werden, während die überwältigende Mehrheit der Nutzer:innen von der Infrastruktur profitieren, ohne einen Beitrag zu dieser zu leisten. Dies führt zur originären Instabilität dezentraler Netzwerke und stellt eine relevante Herausforderung für die Zukunft dar. Während durch Netzwerkanalysen das Wachstum und die Verstetigung von dezentralen Netzwerken beschrieben wird, fehlt es an einem vertieften Verständnis über Bedingungen wie dezentrale Netzwerke überhaupt entstehen. Während des Vortrags werde ich empirische Daten zur Entwicklung des Fediverse und des Tor-Netzwerkes zeigen, um die Herausforderung zu verdeutlichen. Insbesondere das Tor-Netzwerk steht dabei vor dem Problem, dass die Möglichkeit zur De-Anonymisierung steigt, wenn die Anzahl an Knoten sinkt. Die Überwindung des von mir dargestellten Kollektivgutpr
39C3 - Auf die Dauer hilft nur Power: Herausforderungen für dezentrale Netzwerke aus Sicht der Sozi
https://media.ccc.de/v/39c3-persist-resist-stitch

What does knitting have to do with espionage? Can embroidery help your mental health? This talk shows how the skills to create textile art have enabled people to resist and to persist under oppressive regimes for centuries. And it offers ways to keep doing so.

Working with textile mediums like yarn, thread, and floss is generally seen as a feminine hobby and as thus is usually classified as craft, not art. And crafting is something people, maybe even people usually seen as a bit boring, do in their free time to unwind. Most of us have grown up with the image of the loving grandmother knitting socks for the family, an act of care that was never considered anything special.
The patriarchal society’s tendency to underestimate anything considered feminine and, inextricably connected to this, domestic is an ongoing struggle. But being underestimated also provides a cover and with it the opportunity for subversion and resistance.
As global powers are cycling back to despotism and opression, let me take you back in time to show you how people used textile crafts to organise resistance and shape movements. Like the quilts that were designed and sewn to help enslaved people in the US escape slavery and navigate the Underground Railroad from the 1780s on, or the knitted garments that carried information about the Nazis to help resistance in occupied Europe during World War II, or the cross stitches by a prisoner of war that had Nazis unknowingly display art saying “Fuck Hitler”.
Textile crafts have been used by marginalised and disenfranchised people to protest, to organise, and to persist for centuries. This tradition found a new rise in what is now called “craftivism” and is using the internet to build bigger communities spanning the world. These communities also come together to help, often quite tangibly by creating specific items like the home-sewn masks during early Covid19. In addition, crafting has scientifically-proven benefits for one’s mental health.
Taking up the increasingly popular quote "When the world is too scary, too loud, too much: Stop consuming, start creating", this talk shows how the skills to create have enabled and will enable people to resist and to persist.

Philo

https://events.ccc.de/congress/2025/hub/event/detail/persist-resist-stitch

#39c3 #ArtBeauty

Licensed to the public under http://creativecommons.org/licenses/by/4.0
39C3 - Persist, resist, stitch
Post Views: 61
Location
Chicago Ridge Mall
(in food court - across from Sbarro's)
444 Ridgeland Ave.
Chicago Ridge, IL 60415
Newsletter

Latest Updates
  • 08
    Jun
    Log | 2600.06.06.2025 No Comments on Log | 2600.06.06.2025
  • 09
    May
    Log | 2600.05.02.2025 No Comments on Log | 2600.05.02.2025
  • 05
    Apr
    Log | 2600.04.04.2025 No Comments on Log | 2600.04.04.2025
  • 08
    Mar
    Log | 03.07.2025 – Build a Mesh Off-Grid Communicator No Comments on Log | 03.07.2025 – Build a Mesh Off-Grid Communicator
Copyright 2026 © Oak Lawn 2600, All Rights Reserved.
  • Home
  • Updates
  • Links
  • RSS
  • News
  • Join Discord!
  • About Us
  • Contact Us
  • PGP Key
  • -