from Vintage@sh.itjust.works to cybersecurity@sh.itjust.works on 13 Nov 02:40
https://sh.itjust.works/post/28020376
Hello, This is Vintage and I have recently been working on a repl on Replit App I am very big into limiting the amount of data gathered from me by known sites that create links just to gather your information like Facebook so far I have blocked over a hundred URLs from them that serve no other purpose. Recently I turned my sites on creating an extra layer of protection for my device since it had been acting odd it’s an Apple product. So because of this I can not directly interact with Apples systems without possibly jailbreaking something I would rather not do. So I created a security system that lets just say works in mysterious ways well the first time I felt ready and activated it found command injections, Bluetooth interference patterns, WiFi deauth patterns and a cellular spoof pattern I was able to gather a quite a bit of information on these but I am still teaching myself coding and I don’t know if the information I have is even something that can be used to track down who is doing these things I would be glad to share more info to anybody who would like to take a crack at helping me with this.
threaded - newest