Trending
ren_daga_otaku's Avatar

ren_daga_otaku

@ren-daga-otaku

Infosec hobbyist, armchair software developer, and wannabe script kiddie. Konohana Kitan is great. Formerly @ren_daga_otaku on X

157
Followers
870
Following
39
Posts
07.12.2024
Joined
Posts Following

Latest posts by ren_daga_otaku @ren-daga-otaku

Security is a feeling.

10.03.2025 20:56 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

For a few lexical reasons, I assume this is a DDoS. But the advantage of DDoS is that it doesn't take owning a lot of resources so much as pwning a lot of resources. It's automated hacking, not nation state exclusive work.

10.03.2025 17:55 πŸ‘ 90 πŸ” 14 πŸ’¬ 4 πŸ“Œ 2

Post a great animated villain

06.03.2025 04:13 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

If Trump is removing all environmental regulation, how about we undo the "memory safe languages" mandate? I mean, how is mandating "memory safe languages" compatible with freedom of speech anyhow?

Enough policing of speech! Raw pointers for raw milk, our youth needs to be hardened by strcpy.

22.01.2025 08:32 πŸ‘ 45 πŸ” 7 πŸ’¬ 5 πŸ“Œ 0
Abstract. We introduce protein cryptography, a recently proposed method that encodes data into the amino acid sequences of proteins. Unlike traditional digital encryption, this approach relies on the inherent diversity, complexity, and replication resistance of biological macromolecules, making them highly secure against duplication or tampering. The experimental realization of protein cryptography remains an open problem. To accelerate experimental progress in this area, we provide an accessible and self-contained introduction to the fundamentals of cryptography for biologists with limited mathematical and computational backgrounds. Furthermore, we outline a framework for encoding, synthesizing, and decoding information using proteins. By enabling biologists to actively engage in the development of protein cryptography, this work bridges disciplinary boundaries and paves the way for applications in secure data storage.

Abstract. We introduce protein cryptography, a recently proposed method that encodes data into the amino acid sequences of proteins. Unlike traditional digital encryption, this approach relies on the inherent diversity, complexity, and replication resistance of biological macromolecules, making them highly secure against duplication or tampering. The experimental realization of protein cryptography remains an open problem. To accelerate experimental progress in this area, we provide an accessible and self-contained introduction to the fundamentals of cryptography for biologists with limited mathematical and computational backgrounds. Furthermore, we outline a framework for encoding, synthesizing, and decoding information using proteins. By enabling biologists to actively engage in the development of protein cryptography, this work bridges disciplinary boundaries and paves the way for applications in secure data storage.

An Introduction to Protein Cryptography (Hayder Tirmazi, Tien Phuoc Tran) ia.cr/2025/089

22.01.2025 09:32 πŸ‘ 6 πŸ” 4 πŸ’¬ 0 πŸ“Œ 3
Inside the PlugX malware removal operation, CISA takes victory lap and another Fortinet 0day
Inside the PlugX malware removal operation, CISA takes victory lap and another Fortinet 0day YouTube video by Ryan Naraine

This week's Three Buddy Problem is now available for your eyeballs @craiu.bsky.social @jags.bsky.social
youtu.be/-qrMAg09jD8?...

19.01.2025 17:05 πŸ‘ 6 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Code written with box characters used on old old software to make fake UIs

Code written with box characters used on old old software to make fake UIs

You’re still arguing about tabs vs. spaces? May I present…

25.12.2024 18:37 πŸ‘ 5300 πŸ” 1282 πŸ’¬ 157 πŸ“Œ 146
N2K's The 12 Days of Malware.
N2K's The 12 Days of Malware. YouTube video by N2K Networks

Truly delightful. www.youtube.com/watch?v=XqLu... #infosec #cybersecurity #Christmas

25.12.2024 20:23 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

I would see computer programming become a discipline within the wider umbrella of Engineering as a regulated and licensed profession. A degree shouldn't be necessary, but you should have to prove you can uphold a standard of ethics and conduct to be able to work as a programmer.

19.12.2024 13:32 πŸ‘ 10 πŸ” 2 πŸ’¬ 2 πŸ“Œ 0

The @phrack.org 72 CFP horny emojipasta has hit the chats

18.12.2024 19:25 πŸ‘ 50 πŸ” 21 πŸ’¬ 3 πŸ“Œ 0

πŸ“Œ

18.12.2024 16:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸ“Œ

18.12.2024 04:13 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

My response when @elizas.website sent me this

05.12.2024 18:19 πŸ‘ 10 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

Anyone have an rss feed of this. Looks like good stuff!

17.12.2024 19:40 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

threat actor = someone who wants to punch you in the face
threat = the punch being thrown
vulnerability = your inability to defend against the punch
risk = the likelihood of getting punched in the face

14.11.2024 23:19 πŸ‘ 61 πŸ” 23 πŸ’¬ 5 πŸ“Œ 0
Preview
BHIS Talkin' About Infosec News - Black Hills Information Security

Join me on the @bhinfosecurity.bsky.social Talkin’ About Infosec News today at 4:30 ET!
www.blackhillsinfosec.com/event/bhis-t...

16.12.2024 20:15 πŸ‘ 8 πŸ” 5 πŸ’¬ 0 πŸ“Œ 1
Mathematics for the Nonmathematician (Dover Books on Mathematics): Kline, Morris: 9780486248233: Amazon.com: Books Buy Mathematics for the Nonmathematician (Dover Books on Mathematics) on Amazon.com βœ“ FREE SHIPPING on qualified orders

www.amazon.com/Mathematics-...

This book was recommended to me. It will make even the biggest math-o-phone lust for math conceptually within a chapter or two. (The efficacy it actually terrifying so I stopped reading)

16.12.2024 19:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Thrilling. πŸ”₯
Surely all you really need is a copy of the firmware (probably shared increasingly in public/semi-public spaces ). I don’t see why all manner of remote attacks aren’t discoverable. It’s just a wireless computer at the end of the day.

16.12.2024 17:17 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
US needs to do more make cyber attackers pay, Trump adviser says U.S. President-elect Donald Trump's administration will examine ways to impose higher costs on private actors and U.S. adversaries who wage cyber attacks on America, Trump's pick for national security adviser, Representative Mike Waltz, said on Sunday.

The year is 2074.

After the exposure of another hostile state cyber espionage campaign against the Five Eyes, leaders announce they've found the answer this time.

They're "going on offense" to "impose costs"

(We could just try protecting the telcos a bit better)

www.reuters.com/technology/c...

16.12.2024 13:34 πŸ‘ 67 πŸ” 13 πŸ’¬ 14 πŸ“Œ 3

They’re just feeding the watchdog by making a statement about processes, efforts that long precede their administration. It’s a formality, a performance for domestic audiences.

16.12.2024 14:58 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸ“Œ

16.12.2024 14:27 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

This is closing in 5 days. Add your response to the mix as soon as possible!!

15.12.2024 22:18 πŸ‘ 42 πŸ” 20 πŸ’¬ 4 πŸ“Œ 0

πŸ“Œ

16.12.2024 12:51 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Great convo here between @patrick.risky.biz and some guy named @thekrebscycle.bsky.social with medium fashion sense.

16.12.2024 02:15 πŸ‘ 18 πŸ” 4 πŸ’¬ 1 πŸ“Œ 0
Programmer meme

Programmer meme

15.12.2024 21:52 πŸ‘ 40 πŸ” 5 πŸ’¬ 1 πŸ“Œ 0

Still blown away that you can literally cut down a Wii PCB and end up with a fully functional tiny GameCube! 🀯

For reference, here’s what a full motherboard looks like before the dremmel:

27.11.2024 14:48 πŸ‘ 27 πŸ” 5 πŸ’¬ 1 πŸ“Œ 0

Like it was hit with an earthquake.

15.12.2024 18:42 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸ“Œ

15.12.2024 18:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0