𝕄𝕣ℂ𝕣𝕪𝕡 ㉿ Profile picture
ᴄᴏᴍᴍᴜɴɪᴛʏ ᴍᴏᴅᴇʀᴀᴛᴏʀ @hubdotxyz || ᴏꜰꜰᴇɴꜱɪᴠᴇ ꜱᴇᴄᴜʀɪᴛʏ ʜᴀᴄᴋᴇʀ | ᴅɪɢɪᴛᴀʟ ᴘʀɪᴠᴀᴄʏ ᴡᴀʀʀɪᴏʀ | ᴏꜱᴄᴘ | ᴇxᴘʟᴏɪᴛ ᴅᴇᴠ / ᴀᴅ ᴀᴛᴛᴀᴄᴋꜱ | ɴᴏ ᴅᴀᴛᴀ. ɴᴏ ᴛʀᴜꜱᴛ. ᴋɴᴏᴡ ᴇᴠᴇʀʏ ᴠᴜʟɴ.
Jul 29 8 tweets 3 min read
📡 Did you know your home router is the easiest backdoor to spy on EVERYTHING you do online?

It doesn’t matter if you use VPNs or secure browsers.
If your router is compromised, they’re spying without you even noticing.
In 2025 router attacks have exploded: malware, backdoors, and manipulations hitting millions across Europe and the US.

👉 In 2024, several routers were exploited by APTs to mass-filter traffic (ref: CISA report).

This thread will open your eyes: how to detect if you're being watched, lock it down, and truly reclaim your privacy.

🧵 Read on and save this.Image Your router is the heart of your network.
If someone controls it, they can spy, manipulate, inject malware… and you won’t even know.
ISPs and governments already use advanced techniques:
- DNS hijacking
- Deep packet inspection
- Traffic analysis

And you? You browse thinking you're safe.
But a poorly secured network is an invisible trap.
Jul 23 7 tweets 3 min read
Parents, guardians, educators, the digital world isn’t just fun and games. It’s a hunting ground. Every photo, every video, every detail you share about your kids online can be weaponized by criminals, predators, and unscrupulous companies.

We’re facing an invisible epidemic: the reckless exposure of children’s private lives, known as sharenting, that fuels online abuse, grooming, and exploitation.

If you think “it won’t happen to us,” think again. This is happening every day, everywhere. And the cost? Childhood stolen, trust broken, lives destroyed.

Protecting kids today means understanding these dangers and acting before it’s too late.

The internet never forgets. Neither do predators.

🧵 In this thread, I’ll reveal what’s really happening with children’s data and how you can fight back.

Please RT to protect more kids
#Sharenting #ChildSafety #DigitalPrivacyImage Sharenting is when parents publicly share photos, videos, or personal stories of their kids online, often without realizing the consequences.

It starts with innocent birthday pics or bath time videos… but those images don’t stay in your circle. They’re scraped, tagged, stored, and in some cases, traded on the darkest corners of the internet.

Faces become data points. Voices become identifiers. Children become searchable and traceable, and for people you never imagined.

Even “private” posts aren’t safe. Once something’s online, it’s vulnerable to leaks, hacks, or misuse.

Did you know over 60% of parents unknowingly expose their children’s data online through sharenting?

Would you knowingly give a stranger your child’s face and data? That’s exactly what sharenting does.

Sharenting isn’t just a trend. It’s a pipeline that feeds the worst parts of the web. And the children have no way to consent or defend themselves.

Help spread awareness, share this now
Jul 21 9 tweets 5 min read
Does a VPN give you privacy?
Only if you know how it works… and choose the right one.
This thread explains everything that matters in 2025

✅ What a VPN really is
✅ How it works
✅ When it helps and when it doesn’t
✅ What to avoid
✅ Scandals, logs, payments & more

Real privacy, no empty promises.
This content is for educational purposes only. I do not promote or justify the illegal use of any tool.
Let’s go 🧵👇

#VPN #Privacy #CyberSecurityImage What is a VPN and how does it work?

A VPN (Virtual Private Network) creates an encrypted tunnel between your device and a remote server. All your internet traffic goes through that tunnel, hiding what you do online.

What does it achieve?

- Your internet provider (ISP) can’t see what websites you visit.
- It changes your IP, making it look like you're in a different country.
- It protects your data on public Wi-Fi.
- It encrypts your traffic, so others can’t intercept it easily.

Simple example:
Without a VPN: Your ISP sees you accessed x (.)com and the destination IP.
With a VPN: Your ISP only sees you connected to a VPN server. That’s it.

But here’s the catch:
Your VPN can see your traffic. So choosing the right one is crucial.

Wondering “what if I use VPN + Tor?”
VPN + Tor = hides Tor usage from your ISP
Tor + VPN = bypasses site blocks on Tor
But be careful: if misconfigured, you may reduce your privacy instead of improving it.
Tor already offers strong anonymity. A VPN can help in specific cases (like censorship), but it's not always better.
If needed, I’ll explain this in detail in a future thread.
Next up:
✅ Does it really protect you from your ISP?
✅ And what does the VPN actually know?
Jul 18 9 tweets 6 min read
What’s an IMSI Catcher?
Devices that mimic cell towers to track, locate or spy on you without you noticing.
This thread explains (clearly and simply)

How they work
How to detect them
How to protect yourself
Why 2G (GSM) matters
And how Faraday bags help

This content is for educational purposes only. I do not promote or justify illegal use in any way.
🔐 Real mobile privacy
Let’s begin🧵👇

#IMSI #GSM #MobilePrivacyImage In the previous thread, we saw how the IMEI and IMSI can be used to track and identify your phone.

Now let’s go a step further:

👉 What if I told you there are devices that can capture that data without your consent?

They’re called IMSI Catchers.
And they’re much closer than you think.

📎 In case you missed the previous thread:
x.com/MrCrypPrivacy/…
Jul 16 6 tweets 3 min read
Think turning off your phone protects you?

Your device carries two unique codes that follow you everywhere.
You can’t change them. You can’t hide them.
IMEI and IMSI.

Every time your phone connects to a mobile network, it leaves a trace.
No apps needed. No browsing. Just sitting in your pocket.

These IDs reveal:
- What phone you use
- Which tower you connect to
- Where you are
- Which line is yours
- When you swap SIMs
- Even who was nearby

This thread explains what IMEI and IMSI are, why they’re dangerous for your privacy, how they track you, and how to reduce that risk.

Let’s go 🧵👇Image What’s IMEI?

The International Mobile Equipment Identity.
A unique number hardcoded into your device, like a license plate.
You can’t change it easily.
Used to:
- Identify your phone
- Block stolen devices
- Link your movements to the same device, even with a new SIM

What’s IMSI?

The International Mobile Subscriber Identity.
Stored on your SIM card, it ties your line to your network.
It reveals:
- What SIM you’re using
- Who your provider is
- If you changed SIMs
- If it’s still the same person (based on phone or behavior)

IMEI + IMSI = complete surveillance.
Jul 15 5 tweets 2 min read
Your browser spies on you.
But your phone… it gives you away.

It knows where you are, who you’re talking to, when you sleep, what you want, and what you fear.
Even turned off, it keeps gathering info

But you’re not tied to this system.
You can take back control.

The ideal: Google Pixel + @GrapheneOS
It’s the most private combo you can get nowadays.
But if you don’t have a Pixel, you can still harden your current Android with these tools.
The important thing is to start

Here’s apps to make your phone more private (without going crazy)👇

#Privacy #DigitalSecurityImage App stores (outside Google Play)

- Aurora Store (anonymous downloads from Google Play)
- Obtainium (updates FOSS apps from GitHub)
- F-Droid (repo only for open source apps)

Browsers

- @brave
- Vanadium

Search engines

- Brave Search
- @mojeek
- @startpage

Email

- @TutaPrivacy (formerly Tutanota) encrypted, no tracking, no Google.