Victor Gevers Profile picture
(Grumpy Old) Hacker. Co-founder @GDI_FDN. Co-founder @DIVDnl. Co-founder @csirt_global. Unfiltered via https://t.co/3Urur9uAho
Postcards of the Hanging(s) Profile picture MikuKey Profile picture 2 subscribed
Jul 4, 2020 4 tweets 3 min read
I have been looking around in the @parler_app and within the Parler platform. The app lacks basic security like certificate pinning. This makes it easy to take a look under the hood. Most of the accounts are marked as: "human": false". ImageImage To be able to become human in the Parler, you need to get verified. Users can do this by scanning their U.S. drivers license or Passport within the app. I tried a few times with my Dutch Passport but this failed. Even Parlersupport couldn’t help. So I searched for another way. ImageImageImage
Oct 3, 2019 4 tweets 2 min read
There is this Beijing-based Artificial Intelligence company known as Pensees Technology. They build passwordless, rinky-dink, AI-based security software systems using face recognition, and crowd analysis, which can detect a specific ethnic group from photos and video streams. 🤷🏻‍♂️ Peensees products are used for security applications and use existing face recognition technologies and CCTV cameras. This is a (mockup) dashboard of their open AI R&D environment. It looks like a "SenseNets disaster 2.0" in the making as they have no clue what they are doing. 🤦‍♂️
Mar 2, 2019 12 tweets 6 min read
Can anyone (from China) identify these Messaging services?

imsg <--...
qg <--...
qqmesg. <-- imqq.com
wwmsg <--...
wxmsg <--...
yymsg <--...

In China, they have a surveillance program on social networks which looks like a jerry-rigged PRISM clone of the NSA. Daily roughly 1 billion private messages get selected & routed to the closest "operator" based on geolocation. It's fascinating how quickly new monitoring solutions are deployed in the same way as the old ones were discovered & taken down. Country-based filtering for "protection" ImageImage
Feb 13, 2019 26 tweets 14 min read
There is this company in China named SenseNets. They make artificial intelligence-based security software systems for face recognition, crowd analysis, and personal verification. And their business IP and millions of records of people tracking data is fully accessible to anyone. This database contains over 2.565.724 records of people with personal information like ID card number (issue & expire date, sex, nation, address, birthday, passphoto, employer and which locations with trackers they have passed in the last 24 hours which is about 6.680.348 records
Jan 27, 2019 6 tweets 4 min read
Responsible disclosure #4155 took 3 years, 5 months and 15 days to fix the after effect of the leaked credentials. Some breaches don't have to be big in size (as in the number of records which are exposed) to have a significant impact which can take years to fix. [1/2] Until recently many 🇷🇺 companies were using MongoDB not securely.
Most of them are reported to the owners. The biggest issue was that @KremlinRussia_E requires remote access to businesses and used the same credentials everywhere as we found them in the thousands of open databases
Feb 11, 2018 6 tweets 4 min read
Looking for 0xDEADFEED to find 0x8BADF00D that went 0xBAAAAAAD.
Maybe it needs to 0xC00010FF to escape this 0xDEAD10CC situation?
Still hunting for unicorns but I only found a pony till now. Oh I see that @Zeecka_ already found the pony : :-D