mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

635
comptes actifs

#infosec

74 messages61 participants3 messages aujourd’hui

🖱️ Your mouse movements are being tracked.

Websites can log how fast you scroll, how long you hover, and even how you move your cursor. It’s called mouse fingerprinting, and yes—it’s used to identify you even without cookies.

🧠 Bonus? It can even guess your cognitive load or hesitation.

Disable JavaScript when possible, or use hardened browsers like Librewolf or Tor.

Holy shit, the new mastodon.social TOS are stunningly bad. This impressive comparative analysis of social sites' TOS is well worth a read (as might be deleting your account before July 1st if you're on mastodon.social, or later if your own instance adopts these terms, which other instances are invited/encouraged to use as a template).

github.com/mastodon/mastodon/i

Summary Since it first opened, mastodon.social has operated without any sort of explicit IP grant from the users to the service, which is unusual for a social networking service. Today Mastodon ann...
GitHubNew Terms of Service IP clause cannot be terminated or revoked, not even by deleting content · Issue #35086 · mastodon/mastodonPar mcclure
#InfoSec#Data#Security

Where the FUCK did all the hacktavists go? I seriously can't figure out why there's not more cyber push back.

If there were ever a time when it's moral to break the law it's now.

Why don't I see headlines about ICE being breached, or white house data leaked? Why aren't cronies like Musk and Banon being targeted?

The military is deployed in our streets, politicians are being arrested and shot.

What are we all waiting for?

🇬🇧✨ No technical skills, no problem.
At #leHACK 2025, Jayson E. Street brings a raw, honest and hilarious take on what it means to be a hacker—with live demos, DIY hacks using toys and credit cards, and a whole lot of truth bombs.
This is not your usual infosec talk.
🗓️ 27 june
🕐 6:30pm
🔗 lehack.org/2025/tracks/confere
🎟️ Late bird : billetweb.fr/lehack-2025-the-s
Come for the hacks. Stay for the memes.
#infosec #community #leHACK

Suite du fil

🇫🇷✨ Pas besoin de skills techniques pour hacker ?
Jayson E. Street casse les codes pendant #leHACK 2025 : démos en live, hacks faits maison avec des jouets, et une prise de parole engagée (et drôle) sur ce que veut dire “être hacker” aujourd’hui.
🗓️ 27 juin
🕐 18h30
🔗 lehack.org/2025/tracks/confere
🎟️ Dernières places : billetweb.fr/lehack-2025-the-s
Venez pour les démos. Restez pour les memes.
#infosec #communauté #leHACK

leHACKConferences - leHACK

Long before the internet, some phone networks were hackable by playing a single tone at 2600Hz.

Whistled into a phone, it could grant you unrestricted access. Do you have the vocal chops to be an old-school phone phreak?

I built a web app to test your ability to produce the legendary frequency. You won't get free long distance calls but you will get some honor in the knowledge that you could have been a cool hacker. 😎

I am sad to say that I can only whistle up to 1100Hz... But my wife (a long time woodwind player) is able to consistently get it.

Give it a try: phreak.kmcd.dev/

phreak.kmcd.devPhone Phreak EmulatorTest your phreaking skills by hacking this phone line.

I don’t trust Meta with my everyday data, so I definitely wouldn’t trust them with anything sensitive or confidential. Their business thrives on collecting and profiting from personal information. People should be extremely cautious about using tools from a company built on exploiting privacy.

:quotesL:Meta open-sources AI tool to automatically classify sensitive documents:quotesR: | via Help-Net Security.

helpnetsecurity.com/2025/06/05

Help Net Security · Meta open-sources AI tool to automatically classify sensitive documents - Help Net SecurityMeta has released an open source AI tool called Automated Sensitive Document Classification. It was originally built for internal use and is designed to
#Meta#InfoSec#opsec
Spotify for CreatorsLesley Carhart: ICS DFIR Expert par Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie speaks with cybersecurity expert Lesley Carhart about her journey into the field, the importance of community and mentorship, and the unique challenges of working in industrial control systems (ICS) forensics. Leslie shares her hacker origin story, discusses the complexities of ICS security, and recounts a fascinating case study involving a mysterious incident at a power plant. The conversation emphasizes the need for diversity in tech and the vital role of community support in navigating cybersecurity careers.Takeaways• Lesley Carhart's journey into cybersecurity began at a young age with a passion for computers.• The importance of mentorship in the cybersecurity community cannot be overstated.• Industrial Control Systems (ICS) present unique challenges in cybersecurity due to their critical nature.• Understanding processes is key to succeeding in ICS cybersecurity.• Diversity in the tech field has improved over the years, allowing for more varied backgrounds in cybersecurity.• Real-world investigations in ICS can lead to unexpected and humorous outcomes, like the moth story.• Community involvement is crucial for career advancement in cybersecurity.• Self-study and networking are essential for breaking into the cybersecurity field.• The job market for junior cybersecurity professionals is competitive, making community connections vital.• Lesley encourages senior professionals to mentor newcomers to the field. Sound Bites• "I hope we don't end up back there."• "It's been a grand adventure."• "Mentorship can be so, so valuable."Chapters00:00 Introduction to Cybersecurity Community Connections01:43 Lesley Carhart's Hacker Origin Story06:57 Diving into ICS and OT Forensics09:47 Challenges in Industrial Cybersecurity Training13:25 The Complexity of Digital Forensics in ICS15:45 The Moth Story: A Case Study in ICS25:34 The Importance of Community in Cybersecurity30:37 Closing Thoughts and Social Media ConnectionsResourceshttps://www.linkedin.com/in/lcarhart/https://bsky.app/profile/hacks4pancakes.comhttps://infosec.exchange/@hacks4pancakes

SmartAttack: a new type of Attack that uses Smartwatches to secretly steal Data from air-gapped Systems. The attack uses ultrasonic Signals that Smartwatches can pick up and decode. - Paper available on arXiv #Infosec #Hacking arxiv.org/abs/2506.08866v1

arXiv logo
arXiv.orgSmartAttack: Air-Gap Attack via SmartwatchesAir-gapped systems are considered highly secure against data leaks due to their physical isolation from external networks. Despite this protection, ultrasonic communication has been demonstrated as an effective method for exfiltrating data from such systems. While smartphones have been extensively studied in the context of ultrasonic covert channels, smartwatches remain an underexplored yet effective attack vector. In this paper, we propose and evaluate SmartAttack, a novel method that leverages smartwatches as receivers for ultrasonic covert communication in air-gapped environments. Our approach utilizes the built-in microphones of smartwatches to capture covert signals in real time within the ultrasonic frequency range of 18-22 kHz. Through experimental validation, we assess the feasibility of this attack under varying environmental conditions, distances, orientations, and noise levels. Furthermore, we analyze smartwatch-specific factors that influence ultrasonic covert channels, including their continuous presence on the user's wrist, the impact of the human body on signal propagation, and the directional constraints of built-in microphones. Our findings highlight the security risks posed by smartwatches in high-security environments and outline mitigation strategies to counteract this emerging threat.