dragosr
banner
dragostech.bsky.social
dragosr
@dragostech.bsky.social
Autonomous Carbon Based LLM with 42 years of tuning on Information Attack and Defense.
Host of CanSecWest, and PacSec.
Security audits, code, IR, LLM, red team consulting.
Specialize in Firmware, and RF.
VA7MOV
A question about how Signal added post-quantum crypto to the Double Ratchet sent me down a rabbit hole. I built interactive visualizations of ML-KEM (Kyber) and HQC algorithm layers, plus Signal's Triple Ratchet upgrade:
secwest.github.io/post-quantum...
secwest.github.io/triple-ratch...
Post-Quantum Cryptography — ML-KEM & HQC Reference
Interactive reference for NIST post-quantum cryptographic standards: ML-KEM (FIPS 203) lattice-based and HQC code-based key encapsulation mechanisms.
secwest.github.io
February 17, 2026 at 7:52 PM
This is pretty evil, abusive treatment of folks with ADHD in the UK...
February 17, 2026 at 8:51 AM
For everyone that is so confident about the reports of the AI vendors businesses being unprofitable - a look at what we can expect for LLM economics.

secwest.github.io/llm-cost-das...
LLM Cost Dashboard — Inference & Training (Feb 2026)
Interactive LLM cost dashboard: inference cost decline with microwave-oven equivalents, and training cost escalation with Boeing 777 metal smelting equivalents. Updated Feb 2026.
secwest.github.io
February 16, 2026 at 5:23 AM
Reposted by dragosr
Wikipedia receives hundreds of legal demands every year to remove user-written content. Almost all are rejected. We spoke with Wikimedia’s legal team about how Section 230 helps protect volunteer editors and public knowledge. www.eff.org/pages/inter...
The Internet Still Works: Wikipedia Defends Its Editors
Section 230 helps make it possible for online communities to host user speech: from restaurant reviews, to fan fiction, to collaborative encyclopedias. But recent debates about the law often overlook
www.eff.org
February 15, 2026 at 9:57 PM
Reposted by dragosr
This seems like a clever solution to the LLMs drowning websites in requests—auto-convert the content to markdown, which is what they’re doing anyway, and just give them the data.

A good middle ground for folks who don’t mind their info getting plundered by bots.

blog.cloudflare.com/markdown-for...
Introducing Markdown for Agents
The way content is discovered online is shifting, from traditional search engines to AI agents that need structured data from a Web built for humans. It’s time to consider not just human visitors, but...
blog.cloudflare.com
February 14, 2026 at 11:26 PM
Reposted by dragosr
I know there are a lot of mutual aid asks coming out of Minneapolis right now, but both of my kids graduated from South High and it would mean a lot to me for people to contribute to this rent fund for my fellow South families. I’ll match the first $1000 if you post receipts. Tiger Pride 🧡🖤
February 14, 2026 at 5:34 PM
On Ubuntu 22.04+ (incl. 24.04LTS), every SSH login spawns a full systemd --user session, auto-starting 8–15+ desktop services (audio, indexing, portals, a11y) via socket/D-Bus activation — all useless on headless/SSH-only consoles, wasting memory and resources.

Fix:
github.com/secwest/lean-ssh
GitHub - secwest/lean-ssh
Contribute to secwest/lean-ssh development by creating an account on GitHub.
github.com
February 12, 2026 at 8:05 AM
LOL: OpenClaw/Moltbook is forbidden by Anthropic ToS & they have started enforcing it, to the benefit of internet security.

“You may not share your Account login information, Anthropic API key, or Account credentials with anyone else. You also may not make your Account available to anyone else.”
February 9, 2026 at 6:37 PM
Reposted by dragosr
I honestly think we can use LLMs to build systems we understand *better* than we could before
February 9, 2026 at 2:20 PM
Reposted by dragosr
The kindness of strangers: my teenage son was on a date at a fancy restaurant when a fellow diner helped pay the bill
The kindness of strangers: my teenage son was on a date at a fancy restaurant when a fellow diner helped pay the bill
She made a special night even more special for these two young people – and gave me something special too
www.theguardian.com
February 8, 2026 at 11:24 PM
Reposted by dragosr
Working in coordination with standwithminnesota.com, I’m raising rent funds for Minneapolis immigrant families in need. We now have a $5000 match offer (!) and are going to help as many families as we can to stay housed today.

V: @Ian-Coldwater
CA: $iancoldwater
PP: @coldwater

Thank you so much! 🌷
February 5, 2026 at 11:31 PM
Reposted by dragosr
Hey fellow Canadians, if you've been watching people raise emergency rent funds for Minneapolis and thinking "I would pitch in but we don't have Venmo" here is a fundraiser taking Paypal!
This fundraiser was so successful that I’m doing another one! The extra funds that were set for the first family went towards the second family’s total rent need. Let’s keep it going!
I am now raising rent funds for another Minneapolis family who has been impacted by ICE. For this family, the remaining need is $775.

Can we make this happen for them today? I believe in us & will post receipts!

V: @Ian-Coldwater
CA: $iancoldwater
PP: @coldwater

Please help and share!
Thank you 💖
February 5, 2026 at 9:49 PM
I see Hikvision is keeping up to their usual standard of excellence.
Hikvision Wireless Access Points Vulnerability Enables Malicious Command Execution
Hikvision Wireless Access Points Vulnerability Enables Malicious Command Execution
A critical authenticated command execution vulnerability has been disclosed affecting multiple Hikvision Wireless Access Point (WAP) models. The flaw, tracked as CVE-2026-0709, stems from insufficient input validation in device firmware , potentially allowing attackers with valid credentials to execute arbitrary commands on affected systems. The vulnerability carries a CVSS v3.1 base score of 7.2, indicating a high-severity threat. According to the advisory, attackers who can authenticate to the device can send specially crafted packets containing malicious commands directly to the WAP, bypassing critical security controls. This attack vector bypasses network perimeter defenses since it requires valid credentials, making it particularly dangerous in environments where user authentication has been compromised or where insider threats exist. Affected Models and Timeline Affected Model Vulnerable Firmware Version DS-3WAP521-SI V1.1.6303 build250812 and earlier DS-3WAP522-SI V1.1.6303 build250812 and earlier DS-3WAP621E-SI V1.1.6303 build250812 and earlier DS-3WAP622E-SI V1.1.6303 build250812 and earlier DS-3WAP623E-SI V1.1.6303 build250812 and earlier DS-3WAP622G-SI V1.1.6303 build250812 and earlier Hikvision has released patched firmware versions (V1.1.6601 build 251223) that address the flaw across all affected devices. The vulnerability was initially reported on January 30, 2026, by an independent security researcher, exzettabyte. Organizations deploying these WAP models should immediately prioritize updating to the resolved firmware version to mitigate exploitation risks. Vulnerability Details and Impact The authenticated nature of this vulnerability makes it particularly concerning for enterprise environments. While attackers must possess valid device credentials, compromised user accounts, stolen credentials, or insider threats can serve as entry points. Once authenticated, the insufficient input validation allows threat actors to inject and execute arbitrary commands with device privileges , potentially leading to complete system compromise. Organizations operating affected Hikvision WAP models should take immediate action. Patches are available for download on the official Hikvision support portal. Administrators should deploy firmware version V1.1.6601 build 251223 across all vulnerable devices in their infrastructure. Simultaneously, organizations should review access controls and enforce strong authentication mechanisms to limit device access to authorized personnel only. For organizations unable to patch immediately, implementing network segmentation to restrict device access and monitoring authentication logs for suspicious activity can provide interim protection. Additionally, credential rotation for affected devices is recommended to prevent exploitation through compromised accounts. Hikvision’s HSRC continues monitoring security threats and welcomes vulnerability disclosures at hsrc@hikvision.com. Organizations with questions regarding this vulnerability should contact Hikvision support through official channels. Follow us on Google News , LinkedIn , and X for daily cybersecurity updates. Contact us to feature your stories. The post Hikvision Wireless Access Points Vulnerability Enables Malicious Command Execution appeared first on Cyber Security News .
cybersecuritynews.com
February 3, 2026 at 7:02 PM
OpenClaw's "soul-evil" setting: 10% of sessions, it swaps SOUL.md for SOUL_EVIL.md. Whatever's in that file becomes the agent's mind. No guardrails. The naming ("evil", "purge") invites users to write hostile personas.
February 2, 2026 at 8:49 PM
Reposted by dragosr
We’ve assembled so many anti-air drones that we’re already doing it blindfolded 💅
January 28, 2026 at 3:15 PM
Reposted by dragosr
Last year, a human trafficking victim trapped in a crypto scam compound in the Golden Triangle region of Laos contacted me. He then proceeded to leak to me a huge collection of the compound's internal materials.

Then he had to get out alive. This is his story.

🧵👇 www.wired.com/story/he-lea...
He Leaked the Secrets of a Southeast Asian Scam Compound. Then He Had to Get Out Alive
A source trapped inside an industrial-scale scamming operation contacted me, determined to expose his captors’ crimes—and then escape. This is his story.
www.wired.com
January 27, 2026 at 12:15 PM
I wonder how long it will take for folks to start deploying malicious LLM endpoints to mess with these kinds of attackers that just connect to open internet endpoints.
Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation
A malicious campaign is actively targeting exposed LLM (Large Language Model) service endpoints to commercialize unauthorized access to AI infrastructure.
www.bleepingcomputer.com
January 28, 2026 at 7:34 PM
If you ordered anything from Canada Computers on-line in the last month or longer, call your credit card company and lock your card. Their commerce site was dinged with a malware card skimmer.

www.reddit.com/r/bapccanada...
From the bapccanada community on Reddit: Canada Computers online card skimmer
Explore this post and more from the bapccanada community
www.reddit.com
January 23, 2026 at 9:37 PM
Reposted by dragosr
the new best practices for Claude Code doc is really good. they chose their #1 rec very well. every CC user should be typing "Give Claude a way to verify its work" over and over on a typewriter in an empty hotel while their wife thinks they're working on a book
code.claude.com/docs/en/best...
January 22, 2026 at 4:13 PM
Reposted by dragosr
KDE removed FreeBSD support from Plasma login manager stating that KDE/Plasma relies systemd(1)/logind(1) Linux daemons.

FreeBSD should not waste time to work on adding KDE/Plasma desktop install button in bsdinstall(8) installer.

Use MATE/XFCE instead.

github.com/KDE/plasma-l...
January 21, 2026 at 1:24 PM
Some people treat "I don't use AI" as a badge of honor. Others recognize it as a self-imposed handicap.
January 19, 2026 at 7:35 PM
This is some quality work detailed in this in-the-wild VM/sandbox escape campaign.

The 0-day was used for about a year before disclosure to the vendor, according to campaign artifacts.

www.huntress.com/blog/esxi-vm...
January 9, 2026 at 6:31 AM
Reposted by dragosr
In case you didn't see, in the Insider builds, we're currently working on adding the ability to share an audio stream to two Bluetooth audio accessories at the same time 😊

Details here: blogs.windows.com/windows-insi...

I look forward to you trying it if you haven't already!
January 6, 2026 at 1:23 PM
Reposted by dragosr
Merry Christmas 😊
December 25, 2025 at 12:49 PM