About:

Micah Lee is an info security engineer, journalist, and author focused on privacy and open source tools.

Website:

Specializations:

Interests:

Information security Data journalism Open source software Privacy Cybersecurity

Incoming Links:

Subscribe to RSS:
The author is promoting their talk at DEFCON titled 'We are currently clean on OPSEC: The Signalgate Saga,' which discusses a significant security breach involving former national security advisor Mike Waltz and the use of a knock...
Micah Lee's keynote at BSidesPDX discusses the rise of technofascism in the U.S. under Trump's administration, highlighting the dangers of technological repression and the complicity of major tech companies. He outlines practical ...
DDoSecrets exposes ICE contracts from the DHS, revealing significant financial dealings and calling for public pressure against morally questionable contractors.
The article discusses the Kindle library of Jeffrey Epstein, revealing his interests in books related to pedophilia, the elite's evasion of accountability, and various scandals involving Donald Trump. It highlights the recent disc...
Joshua Aaron presented his app ICEBlock at the HOPE conference, which allows users to anonymously report ICE sightings. Despite its viral success and over a million downloads, the app has significant flaws, including unverified re...
The blog post critiques Joshua Aaron's ICEBlock app, which allows anonymous reporting of ICE sightings, labeling it as 'activism theater' due to its lack of community engagement and security concerns. The author highlights that th...
The article discusses the release of 26,000 documents related to Jeffrey Epstein by the House Oversight Committee, highlighting the implications for high-profile individuals like Donald Trump and Steve Bannon. It introduces Google...
Utilizing Signal's nickname feature enhances organization and security in activist groups, helping users manage identities and protect against infiltrators.
The post discusses the use of Signal groups for activism, explaining how to turn an in-person meeting into a Signal group, manage large semi-public groups, and create announcement-only lists. It also highlights the reasons why Sig...
The author has developed an open-source research tool called TeleMessage Explorer to analyze the hacked data from TeleMessage, a company that makes a modified Signal app. The tool is intended for journalists and researchers to fin...
The text discusses the hacking of TeleMessage's archive server and the release of 410 GB of Java heap dumps by DDoSecrets. It includes details about the dataset, the author's findings, and an upcoming open source research tool. Th...
DDoSecrets published 410 GB of data hacked from TeleMessage, an Israeli firm that makes modified versions of Signal, WhatsApp, Telegram, and WeChat. The data contains plaintext chat logs and metadata, including sender and recipien...
The article discusses how the knock-off Signal app used by Trump officials, TM SGNL, was hacked in about 15-20 minutes. The hacker found weak password hashing and used feroxbuster to discover a vulnerable URL, leading to a Java he...
Kyle Schutt, a DOGE software engineer, had his computer infected with malware, leading to his email address and passwords being found in four separate stealer log datasets. He has been included in 51 data breaches and 5 pastes, in...
TeleMessage, an Israeli company, has been used by senior Trump officials to access plaintext chat logs. The company makes a modified version of Signal called TM SGNL, which can access and archive chat logs from its customers. The ...
TeleMessage, a company that provides a modified version of Signal for government agencies, was hacked. The hacker gained access to the Signal message archiving tool, revealing vulnerabilities in the app's security. The stolen data...
The author published an analysis of the unofficial Signal app used by Trump officials and received the Android source code for the app. They are analyzing the code and have published mirrors of the source code on GitHub. The Andro...
The text discusses the use of an unofficial version of the Signal app called TM SGNL by former National Security Advisor Mike Waltz and other Trump officials. It explains how the app archives end-to-end encrypted messages and the ...
The text discusses the use of cell-site simulators by law enforcement agencies in the US to spy on cell phones at specific locations, such as protests. It introduces Rayhunter, an open source tool developed by EFF to detect cellul...
The text is an interview with Micah Lee, an information security engineer, software engineer, journalist, and author, about his recent work with Cyd, Lockdown Systems, OnionShare, and more. He discusses the development of Cyd, its...
The text is a call to join a global day of action to protest Tesla. The author shares their experience with Elon Musk and Twitter, and encourages people to use a new app called Cyd. The author also addresses the issue of vandalism...
The text discusses the fraudulent charity front group, American Community Outreach Network (ACON), used by the AP III militia to accept donations. The group was falsely advertised as a 501c3 tax-exempt non-profit organization, and...
The text is a step-by-step guide to reading the leaked militia chats. It includes information on visualizing the data, downloading the dataset, building a SQL database, and using Datasette to browse the database. It also provides ...
The text discusses the Paramilitary Leaks dataset, which contains over 200 gigabytes of chat logs and recordings from paramilitary groups and militias. The author, a former journalist, is interested in exploring the dataset and sh...