#Obfuscation

Richard Rathenickrauchen@c.im
2025-05-19

@JuliusGoat

Also... it seems most/all of the masked "black-baggers" are #HSI agents, not the usual #ICE "Enforcement and Removal Operations" #ERO officers. ?!?

Apparently HSI stands for "Homeland Security Investigations". There is very little objective info on their involvement online. (I treat all .gov info on this topic as suspect.)

Based on bits of reporting I've heard, these are *investigators* and not enforcers. I assume using them as the equivalent of secret police is a tactical move by #DHS to misdirect and obfuscate.

Whoever they are, they should be in uniform with proper ID plainly visible!

#Misdirection #Obfuscation #Disappeared #Authoritarianism

⚠️ #Tycoon2FA is a rapidly evolving #phishkit bypassing 2FA on M365 & Gmail
🔹 Multi-stage execution chain
🔹 Dynamic code generation & #obfuscation for stealth
🔹 Browser fingerprinting for targeted execution

Analysis of 27 observed evasion techniques👇
any.run/cybersecurity-blog/tyc

#cybersecurity #infosec

2025-05-09

Think your tools are stealthy? Think again. This course teaches how to break detection, unhook APIs, bypass ETW/AMSI, and weaponize obfuscation like top-tier APTs. If you're not evading, you're just noisy. Meet us at @blackhatevents! #RedTeam #MalwareDev #CyberSecurity #BHUSA #Obfuscation

blackhat.com/us-25/training/sc

2025-05-08

"The key is ensuring that AI enhances the report rather than introducing noise"... das sehe ich auch so. Noch mehr rauschen brauchen wir wirklich nicht. #HowItEnds #KI #Obfuscation

arstechnica.com/gadgets/2025/0

WIST Quotationswist@my-place.social
2025-04-21

A quotation from Addison

Method is not less requisite in ordinary conversation than in writing, provided a man would talk to make himself understood. I who hear a thousand coffee-house debates every day, am very sensible of this want of method in the thoughts of my honest countrymen. There is not one dispute in ten which is managed in those schools of politics, where, after the first three sentences, the question is not entirely lost. Our disputants put me in mind of the scuttle-fish, that when he is unable to extricate himself, blackens all the water about him, till he becomes invisible.

Joseph Addison (1672-1719) English essayist, poet, statesman
Essay (1712-09-05), The Spectator, No. 476

Sourcing, notes: wist.info/addison-joseph/39292…

#quote #quotes #quotation #qotd #addison #argument #clarity #communication #debate #dispute #obfuscation #rhetoric #understanding #wordiness

Richard Rathenickrauchen@c.im
2025-03-30

Deception, Obfuscation & Misdirection

This is a concatenation of posts I originally made in 2016-2017--even more relevant today...

Most are familiar with the concept of #FUD—short for #Fear, #Uncertainty & #Doubt. It summarizes a strategy often used in marketing and political propaganda. Its effects are pernicious, divisive and lead to exploitation. Examples abound. Fear is a strong motivator! To resist FUD one must understand how it is practiced using the principles of #Deception, #Obfuscation and #Misdirection.

mdpaths.com/rrr/commentary/dec

#Lies #Liars #TrumpLies #Trump #Authoritarianism #Media #GeorgeOrwell #HannahArendt #Disinformation

Bullshit Meter in the Red
2025-03-29

We published a blog yesterday about a PhaaS and phishing kit that employs DoH and DNS MX records to dynamically serve personalized phishing content. It also uses adtech infrastructure to bypass email security and sends stolen credentials to various data collection spaces, such as Telegram, Discord, and email. blogs.infoblox.com/threat-inte

#dns #doh #mx #adtech #obfuscation #phaas #phishing #phishingkit #threatintel #cybercrime #threatintelligence #cybersecurity #infoblox #infobloxthreatintel #infosec #wordpress #spam #telegram #discord #morphingmeerkat

Bibliolater 📚 📜 🖋bibliolater@qoto.org
2025-03-24

🔴 **Monitoring Reasoning Models for Misbehavior and the Risks of Promoting Obfuscation**

“_While we show that integrating CoT monitors into the reinforcement learning reward can indeed produce more capable and more aligned agents in the low optimization regime, we find that with too much optimization, agents learn obfuscated reward hacking, hiding their intent within the CoT while still exhibiting a significant rate of reward hacking._”

Baker, B. et al. (2025) Monitoring reasoning models for misbehavior and the risks of promoting obfuscation. arxiv.org/abs/2503.11926.

#AI #ArtificialIntelligence #LLM #LLMS #ComputerScience #Obfuscation #Preprint #Academia #Academics @ai @computerscience

Johnny's In The Basementzimmatore@turtleisland.social
2025-03-09

The more you know, the more you know how much you don't know, you know? #philosophy #wisdom #obfuscation

AntheDesignanthedesign
2025-03-04

🔗 Maîtrisez votre maillage interne et la distribution du PageRank

En SEO, l'obfuscation masque certains liens aux moteurs et reste visible pour les utilisateurs.

Les avantages :

➡️ Meilleure répartition du jus SEO
➡️ Optimisation du référencement
➡️ Expérience utilisateur préservée

Découvrez comment l’appliquer efficacement :
👉 anthedesign.fr/referencement/o

Revista Occam's RazorRevistaOccamsRazor@masto.es
2025-02-26
2025-02-23

NY Times: "DOGE’s Only Public Ledger Is Riddled With Mistakes
The figures from Elon Musk’s team of outsiders represent billions in government cuts. They are also full of accounting errors, outdated data and other miscalculations."

Article published Feb. 21, 2025;
Updated Feb. 22, 2025, 4:17 p.m.

By Aatish Bhatia, Emily Badger, David A. Fahrenthold, Josh Katz, Margot Sanger-Katz, and Ethan Singer.

nytimes.com/2025/02/21/upshot/

ONLY THE BEST!

#DOGE #musk #waste #incompetence or maybe #obfuscation #us pole

Andrea Barontinibaro77@ioc.exchange
2025-02-17

A soft request/not-queried-suggestion @matthew_d_green : what about any post about #io #indistinguishabilty #obfuscation on your blog in the near future? 😊

🛠️ Using Compiler Optimizations… to Obfuscate?

Compiler optimizations are supposed to clean up code, make it faster, and sometimes even deobfuscate messy transformations. But what if we could flip that around and use them to make code harder to analyze instead? 🤔

Lately, I’ve been exploring this idea in my research, and it turns out that compiler optimizations can actually reinforce obfuscation when used strategically.

Most obfuscation techniques rely on structured transformations. Decompilers and specialized tooling exploit this structure to recognize and undo them. But if you pass your obfuscation through the right set of compiler optimizations, things get interesting: the compiler won’t fully deobfuscate the transformation, but it reshapes it just enough to break tools that try to reverse it.

End result? A more efficient and resistant obfuscation transformation—basically for free. I find that pretty neat.

There’s a delicate balance here: you need optimizations that shake things up but don’t simplify too much. When you hit that sweet spot, it makes reverse engineering way more painful.

💡 Ever tried messing with compiler behavior in unexpected ways? Would love to hear your thoughts! 👇

#ReverseEngineering #SoftwareProtection #Obfuscation #Compilers #CodeOptimization #SecurityResearch

Alice Dubiel 🔬💉🦠😷🌬☮️odaraia@mastodon.green
2025-01-30

What is wrong with this picture? Guys who are neither intellectually curious nor paying attention when the teacher talks about subtleties of grammar because they’re extorting children of their coins, are now in charge, think AI is the automated slave. Remember they only recognize two genders: men and rapists.
#pronouns #DEIwar #obfuscation #destruction #virtualshredding
404media.co/trump-admin-delete

cryptaxcryptax
2025-01-21

r2ai just de-obfuscated strings inside Linux/Ladvix malware for me.

No, no, I should not say "for me", it makes me sound lazy and passive. In reality, we were a team :D Honestly, I had to pilot it ;P

After some conversation, we understand that a few strings are obfuscated. I ask the AI to de-obfuscate them. r2ai integrates an automatic mode that passes the questions to the AI and is able to process some r2 commands.

1/2

2024-12-26

Как приготовить обфускацию в JavaScript и не сжечь лабараторию: AST, babel, плагины

Вероятно каждый программист или компания, сталкивались с мыслями о своей крутости или хотя бы крутости своих алгоритмов 😎. Разумеется, в этом случае может возникнуть соответствующее нежелание делиться разработками с широкой аудиторией. Данная проблема минимизируется переносом части кода на сервер (если речь идёт о клиент-серверных приложениях). Однако, такой подход не всегда применим, и порой обстоятельства вынуждают нас оставлять чувствительные участки кода прямо на виду. В этой статье мы познакомимся, как минимум, с крутым словом, а по возможности с такой техникой как обфускация в контексте языка JavaScript. Реализуем механизмы для скрытия алгоритмов и усложнения обратной разработки кода. Попутно, мы посмотрим что такое AST, и приведём инструменты, с помощью которых можно взаимодействовать с ним для реализации обфускации.

habr.com/ru/articles/870152/

#javascript #reverseengineering #obfuscation #ast #babel #deobfuscation

VeX HarbingerVeXHarbinger
2024-12-22

A bit of odd art inspired by the MC Frontalot lyric "You cannot hide secrets from the future"

A four panel comic depicting the futility in obfuscation of the truth when time will eventually erode the darkness and bring all to light

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst