veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

299
active users

#obfuscation

3 posts3 participants0 posts today
Richard Rathe<p>Deception, Obfuscation &amp; Misdirection</p><p>This is a concatenation of posts I originally made in 2016-2017--even more relevant today...</p><p>Most are familiar with the concept of <a href="https://c.im/tags/FUD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FUD</span></a>—short for <a href="https://c.im/tags/Fear" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fear</span></a>, <a href="https://c.im/tags/Uncertainty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Uncertainty</span></a> &amp; <a href="https://c.im/tags/Doubt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Doubt</span></a>. It summarizes a strategy often used in marketing and political propaganda. Its effects are pernicious, divisive and lead to exploitation. Examples abound. Fear is a strong motivator! To resist FUD one must understand how it is practiced using the principles of <a href="https://c.im/tags/Deception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Deception</span></a>, <a href="https://c.im/tags/Obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Obfuscation</span></a> and <a href="https://c.im/tags/Misdirection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Misdirection</span></a>.</p><p><a href="https://mdpaths.com/rrr/commentary/deception_obfuscation_misdirection/index.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mdpaths.com/rrr/commentary/dec</span><span class="invisible">eption_obfuscation_misdirection/index.html</span></a></p><p><a href="https://c.im/tags/Lies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lies</span></a> <a href="https://c.im/tags/Liars" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Liars</span></a> <a href="https://c.im/tags/TrumpLies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrumpLies</span></a> <a href="https://c.im/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> <a href="https://c.im/tags/Authoritarianism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Authoritarianism</span></a> <a href="https://c.im/tags/Media" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Media</span></a> <a href="https://c.im/tags/GeorgeOrwell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GeorgeOrwell</span></a> <a href="https://c.im/tags/HannahArendt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HannahArendt</span></a> <a href="https://c.im/tags/Disinformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Disinformation</span></a></p>
Infoblox Threat Intel<p>We published a blog yesterday about a PhaaS and phishing kit that employs DoH and DNS MX records to dynamically serve personalized phishing content. It also uses adtech infrastructure to bypass email security and sends stolen credentials to various data collection spaces, such as Telegram, Discord, and email. <a href="https://blogs.infoblox.com/threat-intelligence/a-phishing-tale-of-doh-and-dns-mx-abuse/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.infoblox.com/threat-inte</span><span class="invisible">lligence/a-phishing-tale-of-doh-and-dns-mx-abuse/</span></a></p><p><a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/doh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>doh</span></a> <a href="https://infosec.exchange/tags/mx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mx</span></a> <a href="https://infosec.exchange/tags/adtech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>adtech</span></a> <a href="https://infosec.exchange/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a> <a href="https://infosec.exchange/tags/phaas" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phaas</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/phishingkit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishingkit</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/infobloxthreatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infobloxthreatintel</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/wordpress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wordpress</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/telegram" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>telegram</span></a> <a href="https://infosec.exchange/tags/discord" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>discord</span></a> <a href="https://infosec.exchange/tags/morphingmeerkat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>morphingmeerkat</span></a></p>
John Zimmatore (he/him)<p>The more you know, the more you know how much you don't know, you know? <a href="https://turtleisland.social/tags/philosophy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>philosophy</span></a> <a href="https://turtleisland.social/tags/wisdom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wisdom</span></a> <a href="https://turtleisland.social/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a></p>
AntheDesign<p>🔗 Maîtrisez votre maillage interne et la distribution du PageRank</p><p>En SEO, l'obfuscation masque certains liens aux moteurs et reste visible pour les utilisateurs.</p><p>Les avantages :</p><p>➡️ Meilleure répartition du jus SEO<br>➡️ Optimisation du référencement<br>➡️ Expérience utilisateur préservée</p><p>Découvrez comment l’appliquer efficacement :<br>👉 <a href="https://www.anthedesign.fr/referencement/obfuscation/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">anthedesign.fr/referencement/o</span><span class="invisible">bfuscation/</span></a></p><p><a href="https://mastodon.social/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a> <a href="https://mastodon.social/tags/pagerank" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pagerank</span></a> <a href="https://mastodon.social/tags/referencement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>referencement</span></a> <a href="https://mastodon.social/tags/maillageinterne" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maillageinterne</span></a> <a href="https://mastodon.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://mastodon.social/tags/trafficweb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>trafficweb</span></a> <a href="https://mastodon.social/tags/webmaster" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webmaster</span></a> <a href="https://mastodon.social/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://mastodon.social/tags/webdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webdev</span></a> <a href="https://mastodon.social/tags/digital" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digital</span></a> <a href="https://mastodon.social/tags/seo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>seo</span></a> <a href="https://mastodon.social/tags/ux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ux</span></a></p>
Crypto News<p>Malicious Crypto-Stealing App Exposed on Google Play - An app on Google Play was discovered stealing cryptocurrency from users, employing... - <a href="https://news.bitcoin.com/malicious-crypto-stealing-app-exposed-on-google-play/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.bitcoin.com/malicious-cry</span><span class="invisible">pto-stealing-app-exposed-on-google-play/</span></a> <a href="https://schleuss.online/tags/decentralizedfinance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>decentralizedfinance</span></a> <a href="https://schleuss.online/tags/checkpointresearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>checkpointresearch</span></a> <a href="https://schleuss.online/tags/socialengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socialengineering</span></a> <a href="https://schleuss.online/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptocurrency</span></a> <a href="https://schleuss.online/tags/searchrankings" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>searchrankings</span></a> <a href="https://schleuss.online/tags/cybercriminal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercriminal</span></a> <a href="https://schleuss.online/tags/digitalassets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitalassets</span></a> <a href="https://schleuss.online/tags/walletconnect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>walletconnect</span></a> <a href="https://schleuss.online/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a> <a href="https://schleuss.online/tags/transaction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>transaction</span></a> <a href="https://schleuss.online/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://schleuss.online/tags/googleplay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googleplay</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/drainer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>drainer</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://schleuss.online/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a></p>
Eric Maugendre<p>About <a href="https://social.coop/tags/magic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>magic</span></a> in coding: “That so many of these computer specialists seem unwilling (or unable) to communicate to others what it is they do or how they do it only exacerbates the apparent impenetrability of their discipline.”</p><p>~ Ensmenger, Nathan L. in his 2010 book "The Computer Boys Take Over: Computers, Programmers, and the Politics of Technical Expertise". Cambridge, MA: MIT Press</p><p><a href="https://social.coop/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a> <a href="https://social.coop/tags/complexity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>complexity</span></a> <a href="https://social.coop/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://social.coop/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a> <a href="https://social.coop/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://social.coop/tags/ethics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethics</span></a> <a href="https://social.coop/tags/aiEthics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aiEthics</span></a> <a href="https://social.coop/tags/generativeAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>generativeAI</span></a> <a href="https://social.coop/tags/LLMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLMs</span></a> <a href="https://social.coop/tags/techBros" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>techBros</span></a> <a href="https://social.coop/tags/quotes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quotes</span></a></p>
Simon Dassow<p>This <a href="https://masto.ai/tags/email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>email</span></a> obfuscation project using <a href="https://masto.ai/tags/HTML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTML</span></a>/#CSS kept me thinking despite having solved the initial problem. The idea of being able to choose from different <a href="https://masto.ai/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a> <a href="https://masto.ai/tags/strategies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>strategies</span></a> was just to much fun to resist, so I gave in and added support for odd, even, exponential, prime, nth, and custom number strategies, while fibonacci remains the default.</p><p>Now I still have to document the whole thing, and probably fix bugs, and polish it a bit - other than that it should be done.</p><p><a href="https://masto.ai/tags/GoLang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoLang</span></a> <a href="https://masto.ai/tags/SideQuests" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SideQuests</span></a></p>
Slayerranger/Crackamphetamine<p><a href="https://youtu.be/Ne2xZQi5jrM" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/Ne2xZQi5jrM</span><span class="invisible"></span></a></p><p>So this is my knowledge college in <a href="https://cyberplace.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> development and <a href="https://cyberplace.social/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a> that I highly recommend.</p><p>Like I said in the YouTube video, I strongly recommend to follow the exercises in the books and decompile your own work with GHIDRA.</p><p>From personal experience, I will tell you there is no shortcut to <a href="https://cyberplace.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> and low-level programming.</p><p>If you are used to writing Python scripts, at some point you will need to understand C and Assembly and the other way around.</p>
Matt Willemsen<p>An anonymous coder nearly hacked a big chunk of the internet. How worried should we be?<br><a href="https://theconversation.com/an-anonymous-coder-nearly-hacked-a-big-chunk-of-the-internet-how-worried-should-we-be-227143" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">theconversation.com/an-anonymo</span><span class="invisible">us-coder-nearly-hacked-a-big-chunk-of-the-internet-how-worried-should-we-be-227143</span></a> <a href="https://mastodon.social/tags/XZUtils" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XZUtils</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a> <a href="https://mastodon.social/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/sockpuppet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sockpuppet</span></a> <a href="https://mastodon.social/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a></p>
void<p>Reverse Engineering Tiktok's VM Obfuscation (Part 1)</p><p>Dropped a new blog post where I detail the start of my journey into TikTok's VM based obfuscation.</p><p>So far only covers the discovery of the script and how I dumped strings from each "program"</p><p><a href="https://nullpt.rs/reverse-engineering-tiktok-vm-1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nullpt.rs/reverse-engineering-</span><span class="invisible">tiktok-vm-1</span></a></p><p><a href="https://infosec.exchange/tags/tiktok" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tiktok</span></a> <a href="https://infosec.exchange/tags/vm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vm</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://infosec.exchange/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a> <a href="https://infosec.exchange/tags/deobfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deobfuscation</span></a></p>
void<p>Hi! Figured I would show everyone what I've been working on for my introduction. Looking forward to making tons of friends here :)</p><p>Been reverse-engineering TikTok / Douyin's VM based web security in my free time. Got to a point where I'm able to extract strings from the bytecode. Here's a few cool dumps</p><p><a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://infosec.exchange/tags/obfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscation</span></a> <a href="https://infosec.exchange/tags/deobfuscation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deobfuscation</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a></p>