M0r3 H4ck3r Th4n Hum4n placed top 100 in the @tracelabs Missing Persons OSINT CTF today; not bad for not having done an OSINT CTF in the last six years! #OSINT#osintforgood
"#Meta...pushed back on the notion that Iron Truth was able to get content taken down outside the platform’s official processes, but declined to comment on #IronTruth’s underlying claim of a back channel to company employees...The real risk...in the extent to which companies that control the speech of billions around the world are receptive to insiders arbitrarily policing expression."
Weird things are happening in the #hamradio and #osint communities these days - a new channel marker suddenly surfaced and this one is like none before: it starts at 5MHz and then repeats its short beeps (pulses, actually) every 400kHz until 30.2MHz, exactly 64 carriers, with the same signal, perfectly synced, it would seem.
So far its origin is unknown and it’s purpose and application is also very much unknown 🙂
It’s been heard all over the world, you can try it yourself with one of the many online #kiwisdr receivers 🙂
🔁 Browser extension that automatically redirects to Picuki.com or Imginn.com when you access any Instagram profile, posts, tagged posts, stories profile, or tags.
Select a viewer option and enable or disable redirection through the popup.
Die Empfehlungsecke wurde sprachlich und inhaltlich komplett überarbeitet. Schaut doch mal rein und hinterlasst euer Feedback. Boost gerne, damit sich das Wissen um die Existenz der Empfehlungsecke weiter verbreitet.❤️
One can see the status of European Airports in line with the current weather activitiy.
From worst to best:
Violet L: Low IFR, the last status before closure
Red I: IFR, Instrument Flight Rules aka weather so bad, you can not really see
Blue M: Marginal VFR, you can see, but barely
V: VFR, Visual Flight Rules, decent visibility and weather
Has there been any attempt at a public repository or database for people to submit threats of violence they've received?
I'm thinking there could be value in collecting them either just to put out there in the open air the true character of what people are facing. But also recording data around them such as usernames, phone numbers, email addresses, any available metadata to reserve for analysis.
Just thinking about issues in the current (though not like it's new) landscape of #politics with my threat research / #threatintel / #osint hat on.
If you know of some videos that you like sharing to work colleagues, friends, and family to help them understand #cybersecurity and the topics above, please reply with links and I'll check them out.
Katana is one of the fastest and most convenient tools to get a list of URLs of target domain. Here's a quick 4-minute guide to its main features that can be useful for #osint:
Current experiment: Read something on Mastodon, bookmark. Background Python job will continuously pull bookmarks, review each toot, extract links and download. Each downloaded article will be summarized using Kagi Universal Summarizer and then the content will be categorized.
Next a new Markdown note is created and added to my Obsidian OSINT Vault.
It works pretty decently. Anyone else been experimenting with these OSINT workflows?