GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Micah Lee (micahflee@infosec.exchange)

  1. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Friday, 05-Dec-2025 06:15:29 JST Micah Lee Micah Lee

    👀 A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip Code https://www.wired.com/story/new-anonymous-phone-carrier-sign-up-with-nothing-but-a-zip-code/

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: media.wired.com
      A New Anonymous Phone Carrier Lets You Sign Up With Nothing but a Zip Code
      from Andy Greenberg
      Privacy stalwart Nicholas Merrill spent a decade fighting an FBI surveillance order. Now he wants to sell you phone service—without knowing almost anything about you.
  2. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Friday, 28-Nov-2025 02:57:13 JST Micah Lee Micah Lee

    https://replaceyourboss.ai/

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: replaceyourboss.ai
      AI CEO – Replace Your Boss Before They Replace You
      Stop working for humans. AI CEO delivers algorithmic thought leadership, with instant decisions, and zero ego. Replace your boss before they replace you.
  3. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Wednesday, 12-Nov-2025 02:56:59 JST Micah Lee Micah Lee

    Apple and WhatsApp vow to defend users in US as spyware companies make inroads with Trump administration https://www.theguardian.com/technology/2025/nov/10/apple-whatsapp-spyware-paragon

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Tech giants vow to defend users in US as spyware companies make inroads with Trump administration
      from https://www.theguardian.com/profile/joseph-gedeon,https://www.theguardian.com/profile/stephanie-kirchgaessner
      Apple and WhatsApp say they will keep warning users if their phones are targeted by governments using hacking software against them
  4. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Friday, 24-Oct-2025 07:42:22 JST Micah Lee Micah Lee

    I was interviewed on the Kill Switch podcast about ICEBlock app, the mutual aid group NorCal Resist, and the insane situation we’re in where Apple and Google are collaborating with Trump to censor apps at will https://podcasts.apple.com/us/podcast/kill-switch/id1449757372?i=1000732939606

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: is1-ssl.mzstatic.com
      kill switch
      from Kaleidoscope
      Podcast Episode · kill switch · 10/22/2025 · 35m
  5. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Saturday, 13-Sep-2025 08:08:15 JST Micah Lee Micah Lee

    Proton Mail suspended the account of a journalist writing for the hacker zine Phrack at the request of a cybersecurity agency, only reinstating the account after public outcry https://theintercept.com/2025/09/12/proton-mail-journalist-accounts-suspended/

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: theintercept.com
      Proton Mail Suspended Journalist Accounts at Request of Cybersecurity Agency
      from Sam Dean
      The journalists were reporting on suspected North Korean hackers. Proton only reinstated their accounts after a public outcry.
  6. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Tuesday, 09-Sep-2025 04:57:06 JST Micah Lee Micah Lee
    • Rich Felker

    @khm @dalias I didn't try confirming it was exploitable because his ego is so fragile he'd probably want to sue me for it. And he updated to a new version of Apache (without known critical CVEs) after I published my post, btw, so in the end I helped him

    In conversation about 6 months ago from infosec.exchange permalink
  7. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Monday, 08-Sep-2025 21:30:27 JST Micah Lee Micah Lee

    I told Joshua Aaron, developer of ICEBlock, that he was running a vulnerable version of Apache on his server. He ignored my vulnerability report and blocked me, and his service is still vulnerable today https://micahflee.com/iceblock-handled-my-vulnerability-report-in-the-worst-possible-way/

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: micahflee.com
      ICEBlock handled my vulnerability report in the worst possible way
      Last week, I wrote about how Joshua Aaron's ICEBlock app, which allows people to anonymously report ICE sightings within a 5-mile radius, is – unfortunately, and despite apparent good intentions – activism theater. This was based on Joshua's talk at HOPE where he made it clear that he isn't taking the advice
  8. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Friday, 05-Sep-2025 00:41:04 JST Micah Lee Micah Lee

    Italian dockworkers threaten Israel cargo ban if Gaza flotilla blocked https://www.politico.eu/article/italian-dockworkers-threaten-israel-cargo-ban-gaza-flotilla-departs-genova/

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/146/647/753/134/696/original/8d6542d235f05d06.png
    2. Domain not in remote thumbnail source whitelist: www.politico.eu
      Italian dockworkers threaten Israel cargo ban if Gaza flotilla blocked
      “If we lose contact with our boats … even for just 20 minutes, we will shut down all of Europe,” dockworker says.
  9. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Wednesday, 20-Aug-2025 03:26:29 JST Micah Lee Micah Lee

    My DEFCON talk "We are currently clean on OPSEC" now has over 30k views on YouTube, so now more people watched my talk than attended DEFCON itself. If you haven't seen it, please do! The Trump admin's incompetence is mindbogglingly BONKERS https://www.youtube.com/watch?v=KFYyfrTIPQY

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments

    1. "We are currently clean on OPSEC": The Signalgate Saga (DEFCON 33)
      from Micah Lee
      Here's my talk about UNBELIEVABLE INCOMPETENCE from the highest levels of the Trump Administration, for DEFCON 33! I gave this talk August 9, 2025, in Las Ve...
  10. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Monday, 11-Aug-2025 12:27:02 JST Micah Lee Micah Lee

    Check out my #DEFCON33 talk about the Signalgate, full of unbelievable incompetence from the highest levels of the Trump administration https://www.youtube.com/watch?v=KFYyfrTIPQY

    In conversation about 7 months ago from infosec.exchange permalink

    Attachments

    1. "We are currently clean on OPSEC": The Signalgate Saga (DEFCON 33)
      from Micah Lee
      Here's my talk about UNBELIEVABLE INCOMPETENCE from the highest levels of the Trump Administration, for DEFCON 33! I gave this talk August 9, 2025, in Las Ve...
  11. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Tuesday, 17-Jun-2025 22:24:14 JST Micah Lee Micah Lee
    in reply to
    • Andy Mouse
    • Cody Casterline 🏳️‍🌈

    @andymouse @NfNitLoop

    Yeah, that's not true. Read up on how Signal is engineered to cryptographically prevent themselves from having access to group metadata and message sender metadata that you're claiming they could share with law enforcement:

    https://signal.org/blog/sealed-sender/

    https://signal.org/blog/signal-private-group-system/

    There's plenty of real things you could criticize about Signal, so maybe stick to those and not the misinformation?

    In conversation about 9 months ago from infosec.exchange permalink
  12. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Tuesday, 17-Jun-2025 17:20:48 JST Micah Lee Micah Lee

    I wrote about how to turn in-person meetings into Signal groups, how to manage large semi-public Signal groups while vetting new members, and how to use announcement-only Signal groups, perfect for rapidly responding to ICE raids https://micahflee.com/using-signal-groups-for-activism/

    In conversation about 9 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: micahflee.com
      Using Signal groups for activism
      Things are heating up. Millions of people are taking to the streets against Trump's rising authoritarianism. Communities around the US are organizing to defend against ICE raids, to protest Israeli genocide, for mutual aid, and for other forms of fighting fascism. Signal can help people safely organize in all of
  13. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Monday, 26-May-2025 23:54:09 JST Micah Lee Micah Lee

    Check it out. I just published TeleMessage Explorer: a new open source research tool https://micahflee.com/telemessage-explorer-a-new-open-source-research-tool/

    In conversation about 9 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: micahflee.com
      TeleMessage Explorer: a new open source research tool
      I've spent the last week or two writing code to make sense of the massive hack of data from TeleMessage, the comically insecure company that makes a modified Signal app that Trump's former national security advisor Mike Waltz was caught using. I've decided to publish my code as open source
  14. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Thursday, 22-May-2025 13:07:08 JST Micah Lee Micah Lee

    My latest on the clean OPSEC saga: TeleMessage customers include DC Police, Andreesen Horowitz, JP Morgan, and hundreds more https://micahflee.com/telemessage-customers-include-dc-police-andreesen-horowitz-jp-morgan-and-hundreds-more/

    In conversation about 9 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: micahflee.com
      TeleMessage customers include DC Police, Andreesen Horowitz, JP Morgan, and hundreds more
      I've been digging through the 410 GB of Java heap dumps from TeleMessage's archive server, provided by DDoSecrets. Here's a description of the dataset, some of my initial findings, details about an upcoming open source research tool I'm going to release, and a huge list of potential TeleMessage customers. First,
  15. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Sunday, 18-May-2025 23:01:02 JST Micah Lee Micah Lee

    Here's how the TM SGNL server, which had access to plaintext chat logs from people like Mike Waltz, got hacked in about 20 minutes https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/ (my first article in WIRED!)

    In conversation about 10 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: media.wired.com
      How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
      from Micah Lee
      The company behind the Signal clone used by at least one Trump administration official was breached earlier this month. The hacker says they got in thanks to a basic misconfiguration.
  16. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Friday, 09-May-2025 01:13:15 JST Micah Lee Micah Lee

    DOGE bro Kyle Schutt's computer infected by malware, credentials found in stealer logs https://micahflee.com/doge-bro-kyle-schutts-computer-infected-by-malware-credentials-found-in-stealer-logs/

    In conversation about 10 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: images.unsplash.com
      DOGE bro Kyle Schutt's computer infected by malware, credentials found in stealer logs
      Kyle Schutt is a 37 year old "DOGE software engineer," according to ProPublica. In February, Drop Site News reported that he gained access to FEMA's "core financial management system." His computer was apparently compromised with malware, because his email address and passwords have shown up in four separate stealer log
  17. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Sunday, 04-May-2025 06:19:12 JST Micah Lee Micah Lee
    in reply to
    • Rich Felker

    @dalias yup, well said

    In conversation about 10 months ago from infosec.exchange permalink
  18. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Sunday, 04-May-2025 05:36:15 JST Micah Lee Micah Lee
    in reply to

    The source code for the TM SGNL apps (basically a backdoored version of Signal used by Trump officials) is public! Since it's open source, I've pushed it to github for easier research https://micahflee.com/heres-the-source-code-for-the-unofficial-signal-app-used-by-trump-officials/

    iOS code: https://github.com/micahflee/TM-SGNL-iOS

    Android code: https://github.com/micahflee/TM-SGNL-Android

    In conversation about 10 months ago from infosec.exchange permalink

    Attachments



    1. Domain not in remote thumbnail source whitelist: opengraph.githubassets.com
      GitHub - micahflee/TM-SGNL-Android: Backdoored Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website
      Backdoored Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website - micahflee/TM-SGNL-Android
  19. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Sunday, 04-May-2025 05:36:15 JST Micah Lee Micah Lee

    I wrote up a detailed analysis of TM SGNL, the unofficial Signal app that senior Trump fascists use to organize their war crimes https://micahflee.com/tm-sgnl-the-obscure-unofficial-signal-app-mike-waltz-uses-to-text-with-trump-officials/

    In conversation about 10 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: micahflee.com
      TM SGNL, the obscure unofficial Signal app Mike Waltz uses to text with Trump officials
      Yesterday, a Reuters photographer captured a photo of the freshly-ousted former National Security Advisor Mike Waltz checking his Signal messages during a Trump cabinet meeting. If you're not familiar with Waltz, he's most well known for inviting The Atlantic's editor-in-chief to secret Trump administration war crimes Signal group. They discussed,
  20. Embed this notice
    Micah Lee (micahflee@infosec.exchange)'s status on Wednesday, 30-Apr-2025 08:43:18 JST Micah Lee Micah Lee

    They're explicitly trying to make antisemitic speech legal, so that just anti-Israel speech will be illegal https://forward.com/fast-forward/716347/antisemitism-bill-congress-jews-jesus/

    In conversation about 10 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: forward.com
      Why the Antisemitism Awareness Act now has a religious liberty clause to protect ‘Jews killed Jesus’ statements
      from @jacobkornbluh
      The Antisemitism Awareness Act's added language says it would not infringe on religious liberty to protect the claim that Jews killed Jesus.
  • Before

User actions

    Micah Lee

    Micah Lee

    Member of the Lockdown Systems Collective making @cyd — writing at https://micahflee.com — author of HACKS, LEAKS, AND REVELATIONS https://hacksandleaks.com

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          34821
          Member since
          21 Nov 2022
          Notices
          126
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.