Sam_Bent
banner
doingfedtime.bsky.social
Sam_Bent
@doingfedtime.bsky.social
ExDarknet Vendor/Market Admin/Buyer, Author, YouTuber, Paralegal, Hacker, DefCon/SANS speaker, podcaster, OSINT & OPSEC Specialist, and Content Creator
It's amazing how many ways the state can find to extract resources from the population by force.

How many years would you get if you stole this much?

(This is an asset from my next video)
December 2, 2025 at 11:11 PM
The same people who weaponized 18 U.S.C. § 371 to stack decades onto defendants now vote on criminal justice reform.
November 26, 2025 at 1:00 PM
On a scale of one to 10, this happens to you after you spent this much money...

how pissed are you?
October 13, 2025 at 3:47 PM
My site that lists these and tells you the status of them is:
darkwebdaily.live

dailydwusclfsu7fzwydc5emidexnesmdlzqmz2dxnx5x4thl42vj4qd.onion
October 8, 2025 at 1:01 PM
Run your own: Self-host.
Fund your own: Stack XMR/Real assets
Answer to no one.
Stop watching the propaganda.
"The people are ultimately subordinate to government,
not the other way around,
and that inversion of power is the problem."
- Edward Snowden
September 28, 2025 at 3:19 PM
Do you know?
September 25, 2025 at 12:17 PM
Happy 23rd Birthday Tor.
September 20, 2025 at 6:30 PM
OnionMasq creates VPN-like behavior by trapping applications in kernel-isolated sandboxes where only Tor-routed network interfaces exist, eliminating the bypass vulnerabilities that plague proxy-based solutions.
Based.
www.sambent.com/onionmasq-to...
September 19, 2025 at 2:38 PM
Monero's Atomic Units: How Privacy Money Scales from Piconeros to Meganeros
www.sambent.com/moneros-atom...
#xmr #monero #crypto
September 18, 2025 at 11:17 PM
Cloud password managers aren't protecting your data, they're collecting it for profit while making you the product in a surveillance economy that profits from your digital enslavement.
https://www.sambent.com/vaultwarden-deployment-self-hosted-password-manager-hardening/
September 11, 2025 at 1:01 PM
No man is good enough to govern another man
without that other man’s consent.
- Abraham Lincoln
-
"Mass Extraction
The Widespread Power of U.S. Law Enforcement to Search Mobile Phones"

https://www.upturn.org/work/mass-extraction/
September 10, 2025 at 6:10 PM
BGPStream enables automated BGP hijack detection through real-time routing analysis and CLI automation that identifies prefix hijacking and generates security alerts for network operators.
https://www.sambent.com/bgpstream-hijack-detection-automated-prefix-monitoring-and-alerts/
September 10, 2025 at 1:01 PM
Brave Browser handles 94 million users monthly with zero dependency on Google or Microsoft servers, and Big Tech should be terrified of what this proves.

https://www.sambent.com/monero-ring-size-evolution-privacy-performance-trade-offs/
September 9, 2025 at 6:01 PM
This 1975 paper established "least privilege" and "defense in depth"
as foundational security concepts.
September 9, 2025 at 2:00 PM
Most ECDH implementations contain fatal flaws that let attackers recover private keys through mathematical manipulation.
https://www.sambent.com/ecdh-security-theater-why-most-implementations-fail/
September 5, 2025 at 5:00 PM
Thompson (back in 1984!) shows how to create
self-replicating trojans at the compiler level
that survive source code audits.
https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
September 4, 2025 at 2:01 PM
I2P garlic routing provides enhanced anonymity through multi-layered encryption and timing correlation resistance mechanisms that protect hop metadata and defeat traffic analysis attacks.
https://www.sambent.com/i2p-garlic-routing-hop-metadata-privacy-and-timing-resistance/
September 3, 2025 at 2:50 PM
Piracy unites people instantly.
Happy downloading.
September 2, 2025 at 11:51 AM
Intel Shadow Stack prevents ROP attacks through hardware-enforced call/return matching.
CET shadow stacks can be corrupted through exception handling vulnerabilities.
August 31, 2025 at 2:14 PM
Hardware enclaves provide confidential computing but aren't immune to side channels.
SGX, TrustZone, and AMD SEV all face microarchitectural timing attacks.
August 31, 2025 at 12:27 PM
Microarchitectural load port contention creates covert channels between processes.
Load/store unit scheduling can leak information about concurrent execution.
August 31, 2025 at 10:48 AM
Which technique bypasses modern stack protection through partial pointer overwrites?
Stack canaries can't detect corruption when only function pointer LSBs are modified.
August 30, 2025 at 2:33 PM
Intel Linear Address Masking allows tagged pointers in user space.
LAM enables memory tagging but doesn't prevent all spatial safety violations.
August 30, 2025 at 1:09 PM
ARM Confidential Compute Architecture protects VMs from hypervisor access.
CCA realms provide hardware-enforced isolation but require trusted firmware.
August 30, 2025 at 11:22 AM
theHarvester custom modules enable specialized OSINT collection through LinkedIn enumeration and breach data correlation.
https://www.sambent.com/theharvester-custom-modules-linkedin-enumeration-and-breach-correlation/
August 29, 2025 at 8:50 PM