The text discusses a practical guide to trick Let’s-Encrypt (LE) to issue a valid TLS certificate for a domain name (CN) that the attacker does not own. It also delves into the historical background and why Certificate Transparenc...
The text discusses the arrest of Pavel Durov, the founder of Telegram, and alleges that he was arrested for facilitating crimes and lying to the community. It also raises concerns about the security and privacy of Telegram, sugges...
The text discusses the interception of HTTPS/TLS/SSL traffic by a state actor in Germany, highlighting the vulnerabilities and mistakes made by the attacker. It provides recommendations for server admins and app developers to enha...
The article explains how to add a backdoor to the SSH Public Key, which will execute whenever the user logs in. It provides a source from GitHub and explains the purpose of the backdoor. It also details the trick to use OpenSSH's ...
The text provides a preliminary report on the Great Firewall of Iran, detailing how the internet is censored, the involvement of big players like Google, Apple, and AWS, and the impact on ordinary citizens. It also discusses the i...
The text discusses disposable Linux root servers that are available for use by hackers and coders. It emphasizes the safety and security of the servers and encourages ethical use. The history of the service is also mentioned, high...