‼️ BREAKING: Researchers have uncovered secret AI surveillance projects linked to KYC provider Persona and OpenAI, sending user data to the US government.
Code references include intelligence program codenames "Project SHADOW" and "Project LEGION."
Analysis of source code revealed OpenAI's user verification systems includes biometric tracking, facial scanning, political screening, and intelligence reporting.
Researchers also discovered ONYX on Persona's government server — matching ICE's $4.2M AI surveillance tool — which scrapes social media and the dark web, builds digital footprints, tracks emotional sentiment, assigns risk scores across 300+ platforms and 28B+ data points, and flags individuals for "violent tendencies."
None of it was hidden. It was all internet-facing.
Here is a list of some of Persona's customers:
- OpenAI (ChatGPT)
- Discord
- LinkedIn
- DoorDash
- Etsy
- Brex
- Coursera
- Carahsoft
- Swan Bitcoin
- Mercury
- Wealthsimple
- Branch
- WeTravel
- Grailed
- Eaze
- Stifel Financial Corp
- First Republic
- Fire & Flower Holdings
- Serviap Global
‼️ Meet the personal hacker who worked for Epstein
His name was redacted, but based on what was previously known:
👉 Sold his company to CrowdStrike in 2017
👉 Took a VP role at the company after the acquisition
👉 Born in Calabria
We can now confirm he is Vincenzo Iozzo.
His LinkedIn shows his company "Iperlane" was sold to CrowdStrike and that he was also a board member of Black Hat, hence he invited Jeffrey to join him at Black Hat.
He is currently CEO of SlashID and likes to post about Shinyhunters on LinkedIn.
He is also one of the authors of iOS Hacker's Handbook.
‼️A security researcher from Australia built a mass surveillance tool by scraping Waze reports and tracking the users behind them
He successfully linked usernames to real-world identities, allowing him to pinpoint where individuals live and work.
Waze has since responded by removing the feature that exposed usernames.
He was able to deanonymize custom usernames by using OSINT tools.
After he has a username he can plot it on a map an see where that user has been it's entire lifetime. Leading to the disclosure of:
- The general area where they likely live (cluster of morning reports.
- The area where they likely work (cluster of daytime reports)
- Their regular commute routes
- Their approximate schedule
‼️A German hacker known as "Martha Root" dressed as a pink Power Ranger and deleted a white supremacist dating website live onstage
This happened during the recent CCC conference.
Martha had infiltrated the site, ran her own AI chatbot to extract as much information from users as possible, and downloaded every profile. She also uncovered the owner of the site. She has published all of the data.
I found this video of “Marta Root” on her YouTube channel explaining what she did.
A chart showing where users of the white supremacist dating site come from.
‼️🇮🇱 Smartphones worldwide were silently infected with Israeli malware via malicious ads
Simply viewing their ads was enough to get infected.
Surveillance company Intellexa gained full access to cameras, microphones, chat apps, emails, GPS locations, photos, files, and browsing activity.
Internal leaked company documents, sales and marketing materials, as well as training videos from the “Intellexa Leaks” investigation provide a never-before-seen glimpse into the internal operations of a mercenary spyware company focused on exploiting vulnerabilities in mobile devices to enable targeted surveillance attacks on human rights defenders, journalists, and members of civil society.
In an attempt to hide the spyware operator's identity, all data is relayed through a chain of anonymization servers called the “CNC Anonymization Network.”
Since the spyware relies on browser exploits, the operator must trick the victim into opening the malicious link; if the link is not opened, infection fails.
Each time a one-click attack link is sent, it risks exposing the operator, as a suspicious target may share it with forensic experts, revealing the attack and potentially the operator.
‼️🇰🇵 Meet North Korean recruiter 'Aaron,' who infiltrates Western companies by using AI and posing as a remote IT worker using stolen or rented identities.
He was lured into a sandbox by researchers, who observed the wild APT in a controlled setting to see what he would do.
He wanders around the web sending messages to people like "I’d like to offer your an opportunity that I think could be interesting.".. Turns out @MauroEldritch likes opportunities.
Aaron then asks the "legit" worker to download AnyDesk.