OpSec is Hard
Joined a local FaceBook political action group. Wanted to lurk for a while. Dang thing apparently auto posts "Welcome New Members... [long list of names]". Mentioned that might be bad idea to group admins. No clue. #OpSec
OpSec is Hard
Joined a local FaceBook political action group. Wanted to lurk for a while. Dang thing apparently auto posts "Welcome New Members... [long list of names]". Mentioned that might be bad idea to group admins. No clue. #OpSec
**Emergency Status Update**
The three month hiatus is over. The ParanoidTimes bunker has been compromised.
I scrubbed our social media and now we are back online in an all new location.
https://paranoidtimes.ca/posts/the-great-escape/
We are no longer going to discuss geographical locations.
Much better #opsec - never give anyone any hints.
I practiced *some* good #OpSec today and didn't bring my phone to the #Protest ...but I didn't stay masked the whole time. There were a LOT of cameras so I'm sure I'm in someone's photo somewhere. If you spot this sign, you're seeing me. (Someone else also used the slogan but used different colors.)
On Wed evening, #Trump met w/VP #JDVance; the WH chief of staff, #SusieWiles; the WH personnel chief, #SergioGor; his Mideast envoy, #SteveWitkoff, & others about whether to stick w/ #MikeWaltz.
Late Thurs, as the controversy swirled, Trump summoned Waltz to the Oval Office. By the next morning, Trump signaled to people around him that he was willing to stick w/Waltz….
#CommanderInChief? #Unfit #NationalSecurity #Signal #SignalGate #law #military #OpSec
‘Should I Fire Him?’ Inside #Trump’s Deliberations Over the Fate of #MikeWaltz
In public, President Trump has defended his national security adviser. But behind the scenes, he has been asking people inside & outside the administration what they thought he should do.
#CommanderInChief? #Unfit #NationalSecurity #Signal #SignalGate #law #military #OpSec
https://www.nytimes.com/2025/03/29/us/politics/trump-signal-michael-waltz.html?unlocked_article_code=1.7k4.mPYh.-3zVC5P5UD8M&smid=nytcore-ios-share&referringSource=articleShare
Twitter, #X, hit by massive data breach potentially impacting 2.8 billion users, inside job suspected - “A data leak involving a whopping 2.87 billion Twitter (X) users has surfaced on the infamous Breach Forums. According to a post by a user named ThinkingOne, the leak is the result of a disgruntled X employee who allegedly stole the data during a period of mass layoffs. If true, this would be the largest social media data leak in history, but surprisingly, neither X nor the broader public appears to be aware of it.” #DataBreach #DataPrivacy #opsec #infosec #Twitter #privacy
https://hackread.com/twitter-x-of-2-8-billion-data-leak-an-insider-job/
If you use #Thunderbird I highly recommend the DKIM checker plugin.
Even if the DKIM is valid, it's a nice extra reminder of the domain name of the sender too.
Hint: ...I don't think this is one NVIDIA uses :) Sad that email has ended up this way.
The Signal chat exposes the administration’s incompetence – and its pecking order | Sidney Blumenthal | The Guardian
#USPol #SignalGate #OpSec #Trump #StephenMiller #Hegseth
https://www.theguardian.com/commentisfree/2025/mar/29/signal-chat-trump-incompetence-stephen-miller
A day without guarding your privacy is a day gifted to the watchers. What did you lock down today? #DeadSwitch #OpSec
Whoa, looks like BlackLock got hacked. Seriously, it just hammers home how vital good security practices are – even if you're on the *other* side of the fence! Major OPSEC blunder right there, wouldn't you say?
And hey, this really drives home another point: relying *only* on automated scans? That's just not cutting it for real-deal pentesting, people. You absolutely have to get hands-on and dig in manually. There's no substitute for it.
Honestly, that’s the kind of thorough work our clients appreciate – when we actually probe deeper than just the surface findings. It makes a difference.
So, what’s your take? Seems like OPSEC gets overlooked way too often, doesn't it? Curious to hear your thoughts!
@knittingknots2 Everybody knows white people don't have to get security clearances. Their #OPSEC is always top shelf!
In Kegseth's case, the shelves are definitely lower but you know what I mean.
I've held various security clearances over the decades and what is pissing me off and I see VERY few people mention it is one HUGE factor in this OPSEC violation.
They were using 3rd party apps to bypass security data retention policy for their activities.
That in and of itself, it illegal.
NSA F9T53 Opsec Special Bulletin: Signal Vulnerability
Seems easier to just use Linux.
I know the world is aware of it but I still can't believe it. Fucking idiots, the lot of them ! Why'd they fucking use Signal for that kind of shit ?!?!
Also fuck your "clean opsec". Your opsec is as clean as my butt after I sit on the grass.
https://odysee.com/@AlphaNerd:8/the-government's-secret-signal-group:1
Wird wohl mal wieder Zeit für nen neuen Blogbeitrag:
https://wwwbundesnachrichtendienst.de
https://wwwbnd.de
https://wwwbsi.de
https://wwwverfassungsschutz.de
DeadSwitch Protocol: 02 — The Password Graveyard #DeadSwitch #PasswordGraveyard #CyberGhost #DigitalDecay #OPSEC #CyberSecurity #KeePassXC #PasswordSecurity #SecureYourAccess #Infosec #DataProtection #NoMoreReusedPasswords #DigitalFortress #CyberTips #MFAIsNotEnough #EncryptionFirst #GhostKeyMethod #FearTheSwitch
http://tomsitcafe.com/2025/03/28/%f0%9f%94%90-deadswitch-protocol-02-the-password-graveyard/