TIL about this open source tool that helps you see what connections app make and block them if they're sus.
https://github.com/evilsocket/opensnitch?tab=readme-ov-file#key-features
This mastodon client came to me in a fever dream.
I had to waste the whole day, but now you too can bunnyhop through your fedi feed.
https://files.burning.homes/experimental/hall-of-toots/index.html
* webgl required
* mobile somewhat supported
* yes this html file is a whole client and the entire source
* it would run smoother and look better if you launch it locally so it don't have to bypass CORS, but oauth won't work and you'll have to use access token
* you can click urls and images
* you don't really have to login, and can just hop around the public timelines (i.e. Instance = https://mastodon.social , empty token, Federated timeline, Use Access Token)
* but I'm too tired to support CW and sensitive, so it'll kinda be full of porn
* admins will hate you
* 429 error means you won
* I am in dire need of salvation
Been listening into more upbeat stuff lately instead of the heavier / industrial stuff.
Why use a URL shortener when you can use a phishy URL extender?
Keep your security people alert and awake, generate phishing-looking redirecting links
“GlassWorm isn't just another supply chain attack. It's using stealth techniques we've never seen before - invisible Unicode characters that make malicious code literally disappear from code editors. Combine that with blockchain-based C2 infra that can't be taken down, Google Calendar as a backup command server, and a full remote access trojan that turns every infected dev into a criminal proxy node.”
#technology #attack #security #cybersecurity #malware #vscode
Occult Enby that's making local-first software with peer to peer protocols, mesh networks, and the web.
Yap with me and send me cool links relating to my interests. 👍