![the background blur](https://darknetdiaries.com/imgs/darknet-diaries-sm.jpg?thumbnail=256&format=webp)
![](https://darknetdiaries.com/imgs/darknet-diaries-sm.jpg?thumbnail=1024&format=webp)
In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changed everything.
Sources
https://www.rechtspraak.nl/Organisatie-en-contact/Organisatie/Rechtbanken/Rechtbank-Oost-Brabant/Nieuws/Paginas/Developer-of-Tornado-Cash-gets-jail-sentence-for-laundering-billions-of-dollars-in-cryptocurrency.aspx
https://www.ic3.gov/Media/Y2024/PSA240425
https://www.tabnak.ir/fa/news/1225983/کسر-۳-میلیون-تومان-از-حساب-افراد-بابت-بی-حجابی
https://www.independentpersian.com/node/348011/سیاسی-و-اجتماعی/قرار-است-بخشی-از-کسر-بودجه-از-جزای-نقدی-قانون-حجاب-اجباری-تامین-شود#:~:text=قرار%20است%20بخشی%20از%20کسر%20بودجه%20از%20جزای,۱۸%20تا%20۳۶%20میلیون%20تومان»%20تعیین%20شده%20است
https://www.coinspeaker.com/arrest-bitcoin-advocate-ziya-sadr/
https://www.eff.org/deeplinks/2023/08/tornado-cash-civil-decision-limits-reach-treasury-departments-actions-while
Attribution
Darknet Diaries is created by Jack Rhysider.
This episode was researched and written by Fiona Guy.
Assembled by Tristan Ledger.
Episode artwork by odibagas.
Mixing by Proximity Sound.
Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.
![the background blur](https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog15244354/errorcodelogo_4c3bvb_300x300.png?thumbnail=256&format=webp)
![](https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog15244354/errorcodelogo_4c3bvb_300x300.png?thumbnail=1024&format=webp)
Error Code podcast. EP 40: Hacking IoT Surveillance Cameras For Espionage Operations
That camera above your head might not seem like a good foreign target, yet in the Ukraine there’s evidence of Russian-backed hackers passively counting the number of foreign aid workers at the local train stations. Andrew Hural of UnderDefense talks about the need to secure everything around a person, everything around an organization, and everything around a nation because every one can be a target.
Defense in Depth podcast - Securing Identities in the Cloud
All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is our sponsored guest, Adam Bateman, CEO, Push Security.
The SaaS attacks matrix community resource mentioned by Adam in the episode can be found here.
Editorial note: Geoff Belknap is an advisor to Push Security.
In this episode:
-
Where are we going wrong
-
Finding the missing pieces
-
Protecting an expanding border
-
It starts with understanding risk
![the background blur](https://infosec.pub/pictrs/image/e29ca14b-d744-4de4-8a79-06a2d943d393.png?thumbnail=256&format=webp)
![](https://infosec.pub/pictrs/image/e29ca14b-d744-4de4-8a79-06a2d943d393.png?thumbnail=1024&format=webp)
fwd:cloudsec is a non-profit conference on cloud security. At this conference you can expect discussions about all the major cloud platforms, both attack and defense research, limitations of security features, the pros and cons of different security strategies, and generally the types of things cloud practitioners want to know, but that don't fit neatly into a vendor conference schedule.
5 municipal workers who were fixing water wells were killed by Israel today
Why do you think Israel has bombed and totally destroyed all universities and libraries in Gaza?
How come American media is reporting this stuff now, when it has been happening for 50 years?
Was ist eigentlich das IGERla? Das IGERla ist eine verkleinerte Variante der Intergalaktischen Erfahrungsreise (IGER, siehe nächster Abschnitt). Sie findet 2024 anstatt einer “großen” IGER statt, um das Orga-Team zu schonen. Die Location und das Grundkonzept bleiben gleich; ein paar der in der folgenden Sektion genannten “Standards” werden wir in diesem Jahr möglicherweise nicht erfüllen können.
![the background blur](https://darknetdiaries.com/imgs/darknet-diaries-sm.jpg?thumbnail=256&format=webp)
![](https://darknetdiaries.com/imgs/darknet-diaries-sm.jpg?thumbnail=1024&format=webp)
In this episode, Joseph Cox ( https://infosec.exchange/deck/@josephcox)) tells us the story of ANOM. A secure phone made by criminals, for criminals.
This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.
![the background blur](https://bsidescharm.org/wp-content/uploads/2024/02/Logo-Mascots-2.png?thumbnail=256&format=webp)
![](https://bsidescharm.org/wp-content/uploads/2024/02/Logo-Mascots-2.png?thumbnail=1024&format=webp)
BSidesCharm is a regional Security BSides held in the Baltimore region of Maryland. It operates under the umbrella principles of Security BSides as a larger community project within information security. BSides aims to offer small, intimate events where all participants can engage each other to help develop connections, friendships, and network with different industry professionals.
Symposium sur la sécurité des technologies de l'information et des communications
Botconf typically gathers 400 people from all around the world and various backgrounds. They all share the same goal of fighting malware, but with complimentary approaches: law enforcement, academia, CSIRT, threat analysis teams, antivirus developers, etc.
![the background blur](https://infosec.pub/pictrs/image/eb844ea0-4a3c-40a9-b29f-98022d7c2323.png?thumbnail=256&format=webp)
![](https://infosec.pub/pictrs/image/eb844ea0-4a3c-40a9-b29f-98022d7c2323.png?thumbnail=1024&format=webp)
BSides Seattle is a community based conference for individuals in or interested in Information Security. Founded in 2012, BSides Seattle continues to provide space for the open sharing of ideas, concepts and debates. A place where security geeks of all ages, all levels of learning, all walks of life can bring their true selves and learn amazing things
![the background blur](https://insomnihack.ch/wp-content/uploads/2023/11/SKULL_ULTRA_6938y7X-e1701093173718-350x246.png?thumbnail=256&format=webp)
![](https://insomnihack.ch/wp-content/uploads/2023/11/SKULL_ULTRA_6938y7X-e1701093173718-350x246.png?thumbnail=1024&format=webp)
Insomni'hack is a Swiss security conference and hacking contest founded and organized by SCRT S.A.
![the background blur](https://infosec.pub/pictrs/image/e3122a07-0db4-40ed-b738-621453aa16ca.png?thumbnail=256&format=webp)
![](https://infosec.pub/pictrs/image/e3122a07-0db4-40ed-b738-621453aa16ca.png?thumbnail=1024&format=webp)
Welcome to SCYTHE's fifth annual UniCon, a free virtual all-day purple teaming conference held on April 9, National Unicorn Day!
#UniCon24 Theme: Strengthening Cyber Resilience
Opening Keynote: -Dave Kennedy - Co-Founder & Chief Hacking Officer, TrustedSec
Keynote: -Jake Williams - Enterprise Risk Management Expert
Closing Keynote: -Bryson Bort - CEO & Founder, SCYTHE
Acclaimed speakers (alphabetical order) include: -Zack Allen, Director, Datadog -Lesley Carhart, Technical Director, Dragos, Inc. -Nicholas Carroll, Cyber Incident Response Manager, Raytheon -Jeremiah Dewey, SVP, Rapid7 -Thomas VanNorman, CISSP, GICSP, SVP, GRIMM Cyber -Tarah M. Wheeler, CEO, Red Queen Dynamics
that isn’t very democratic, is it?
Stopping aid was the objective.
I used to use news sites (BBC, Guardian mainly), but the coverage is seriously limited and quite biased.
Gaza Health Ministry statistics are credible and used by everyone including the Israeli government and military. Athough the Israelis will publicly dispute the statistics, they use them internally as the numbers are good.
“On one occasion, a handful of children, all about ages 5 to 8, were carried to the emergency room by their parents. All had single sniper shots to the head.”
How much of a shitty person do you have to be, to snipe little kids in the head?
Stirling Castle is the most castley castle anywhere.
Kilsyth town is a terrible place but the area around it is really nice. Loch Banton and Colzium estate, especially in the autumn rain. Auchinstarry Quarry. There are the remains of the Antonine wall around there (this is as far north as the Roman empire got).
From memory, Iran last invaded another country 300 years ago. Israel....
Genocide. You know they are attempting to commit genocide and you help out. That is being complicit.
There is an "Obligation to prevent genocide (Article I)" which, according to the ICJ, has an extraterritorial scope. See the Genocide Convention Fact Sheet here https://www.un.org/en/genocideprevention/documents/Genocide Convention-FactSheet-ENG.pdf
the other option is to comply with the Houthi demands that the starvation of the people of Gaza be ended and supplies be allowed in accordance with the International Laws
The deportation of Palestinians to anywhere else would be a war crime under the Geneva Conventions -"Convention (IV) relative to the Protection of Civilian Persons in Time of War. Geneva, 12 August 1949".
To quote "Individual or mass forcible transfers, as well as deportations of protected persons from occupied territory to the territory of the Occupying Power or to that of any other country, occupied or not, are prohibited, regardless of their motive."
Source: https://ihl-databases.icrc.org/en/ihl-treaties/gciv-1949/article-49?activeTab=undefined
‘apparent’. What they need confirmation from the IDF that it was an Israeli airstike? Is the IDF still admitting to war crimes now that there are going to be ICJ hearings on Monday?
A bit late Bernie. 9000 kids dead and 70% of housing destroyed, most of the hospitals bombed.
Well the stories did read like really bad fan-fic.
Users passwords were leaked in other breaches. 23andme could have forced everyone to setup new passwords but that is not usual practice, is it?
The evidence was a chair and a rope on the floor in a bombed portion of the hospital.