TechnoTenshi 🏳️‍⚧️
banner
technotenshi.bsky.social
TechnoTenshi 🏳️‍⚧️
@technotenshi.bsky.social
210 followers 310 following 210 posts
Polyglot coder, proud trans girl 🏳️‍⚧️. Passionate about infosec, privacy, trans rights. Sharing transition journey, tech insights. Into distributed systems, Final Fantasy. Enjoys J-pop, girl K-pop, J-metal. Collects anime figures, cosplays.
Posts Media Videos Starter Packs
Pinned
I need to disconnect for a bit. The news is too much right now, and my mental health's taking a hit. I’ll be muting some stuff and stepping back. Dealing with GAD, PAD, and MDD—I just can’t today.
Security alert: Malicious versions of the nx build tool compromised GitHub accounts, stealing wallets, API keys, and credentials. Impacted users may see a "s1ngularity-repository" created in their org. Update nx, check repos, and rotate secrets.

#SupplyChainSecurity #AppSec #Malware #GitHub
Security Alert | NX Compromised to Steal Wallets and Credentials
What is s1ngularity-repository? Nx is compromised and the malware steals wallets and API keys using Claude CLI or Gemini.
semgrep.dev
Reposted by TechnoTenshi 🏳️‍⚧️
Orlando wasn’t having what DeSantis did. They recolored the Pulse Memorial crosswalk.
NGINX releases preview of native ACME protocol support via new Rust-based module, enabling direct SSL/TLS certificate issuance and renewal from configuration without external tools like Certbot, aiming to simplify management and improve security.

#nginx #acme #ssl #infosec
NGINX Introduces Native Support for ACME Protocol  – NGINX Community Blog
blog.nginx.org
Happy second cracked-my-egg anniversary to me! 🎉🥚🎊 #TransJoy
WhoFi is a new system that identifies people using only Wi-Fi signals instead of cameras. It uses a Transformer model to analyze signal changes caused by someone walking. On the NTU-Fi dataset, it got 95.5% top accuracy.

#machinelearning #wifi #biometrics #cybersecurity
WhoFi: Deep Person Re-Identification via Wi-Fi Channel Signal Encoding
arxiv.org
A Firebase misconfiguration exposed 72,000 images including selfies and IDs from women's safety app Tea. Data was posted on 4chan before being locked down. Breach also included some DMs, per company. Incident tied to 2023 data.

#infosec #databreach #privacy #firebase
archive.ph
A new proof shows quantum cryptography can be built on problems even harder than NP, offering security beyond classical encryption. Researchers introduced "one-way puzzles" to replace traditional cryptographic foundations.

#QuantumComputing #Cryptography #Infosec #PostQuantum
Quantum Scientists Have Built a New Math of Cryptography | Quanta Magazine
In theory, quantum physics can bypass the hard mathematical problems at the root of modern encryption. A new proof shows how.
www.quantamagazine.org
Attackers spoofed Google using a DKIM replay exploit and a Google Sites phishing page to deliver fake subpoena emails that passed SPF, DKIM, and DMARC checks. Trusted infrastructure used to bypass user skepticism.

#EmailSecurity #Phishing #DKIM #DMARC
Google Spoofed Via DKIM Replay Attack: A Technical Breakdown
Learn how a Google spoof used a DKIM replay attack to bypass email security and trick users with a fake subpoena in this real-world phishing case.
easydmarc.com
SecretSpec offers a new declarative approach to secrets management, enabling one spec to work across local dev, CI/CD, and production with different providers, all without changing app code. Not a paid promotion or endorsement.

#DevSecOps #SecretsManagement #OpenSource #Infosec
Announcing SecretSpec: Declarative Secrets Management - devenv
Fast, Declarative, Reproducible, and Composable Developer Environments using Nix
devenv.sh
The UK may retreat from forcing Apple to break end-to-end encryption after US pressure, fearing damage to tech deals and privacy agreement violations. Apple and WhatsApp are challenging the order in court.

#Encryption #Privacy #UKTechPolicy #Infosec
UK backing down on Apple encryption backdoor after pressure from US
UK officials fear their insistence on backdoor endangers tech deals with US.
arstechnica.com
A new method shows how to encode up to 45 characters of text in a shuffled 52-card deck using Lehmer codes and the factorial number system. With 225 bits of data capacity, it's a subtle way to hide messages in plain sight.

#Infosec #Steganography #Privacy #Crypto
Asher Falcon
Asher Falcon's personal website - Software engineer and student
asherfalcon.com
A US citizen deleted their entire social media history before traveling, fearing border scrutiny. In 2025, social media feels less like self-expression and more like self-incrimination. The shift reflects growing concerns over digital permanence and surveillance.

#Privacy #Surveillance #SocialMedia
Deleting social media presence before visiting the US
Column: In 2025, social media has moved from self-expression to self-entrapment
www.theregister.com
Typage 0.2.3 adds support for encrypting files with passkeys via WebAuthn PRF, enabling phishing-resistant, hardware-bound symmetric encryption in browser and CLI with age-plugin-fido2prf.

#WebAuthn #Passkeys #Encryption #FIDO2
Encrypting Files with Passkeys and age
Encrypting files with passkeys, using the WebAuthn prf extension and the TypeScript age implementation.
words.filippo.io
FOKS launches as a federated, end-to-end post-quantum encrypted Git and KV hosting tool, with support for YubiKeys, team management, and privacy-preserving metadata. Fully open-source and bootstrapped.

#Encryption #PostQuantum #OpenSource #DevSecOps
Federated Open Key Service (FOKS)
foks.pub
Netflix: "That hot new anime you’ve all been waiting for? Kaoru Hana wa Rin to Saku? Yeah, it's airing in Japan... but the rest of you? Wait until September..."

Me: "Aye aye, Captain... found it already!" 🏴‍☠️🦜

#netflix #netflixjail #kaouruhana