Poll-Dancing & Age Verification - a critical view of yougov's obvious biased framing of the age verification shit-show
Read more
what laws allow what government departments legal access to information on the end of an IP Address, it's called Juri. after Jurisdiction - https://juri.host/
Read more
What to do when you no longer need a domain
Read more
The wrong people in the room when the decisions where made to reduce citizen data security.
Read more
Threat Modeling is not everyone's cup of tea, but let's threat model everyone's cup of tea.
Read more
Playing with folder resolution to build a better pretext
Read more
Who needs to know when a domain has expired ?
It Depends, and it Deepens.
Read more
File Folding is a technique that moves a file into hex, and that hex is broken into folder file names in a fashion that can be reconstructed.
Read more
OffSec
Data-Bouncing - The art of indirect exfiltration. Using & Abusing Trusted Domains as a 2nd Order Transport.
Read more
Random
How to implement MFA in Ghost Blog with Cloudflare's Zerotrust Access Policy.
Read more
OffSec
The idea behind three word passwords as a concept is in my opinion a nice nudge in the right direction, In a perfect world, a passphase or a sentence
Read more
Exploitation
I wonder if any of these leaked email address domains are expired, and I wonder if I can buy them and inherit the identities associated with them via password resets
Read more
Exploitation
If you have ever dismissed a search order binary plant attack because the folder from where it takes place doesn’t allow for writes without elevation?
Read more
EntSec
Visibility everywhere yeilds a better understanding of work working, or work needing more support or new approaches. this is that for AD passwords en-mass.
Read more
Random
Don't make criminals of victims, think a little harder on this problem.
Read more
Ideas
DNS Security TXT record
A method to hold security contact signposting from an authoritative position - from Casey Ellis & myself https://dnssecuritytxt.org/?tc
Read more