Sam_Bent
banner
doingfedtime.bsky.social
Sam_Bent
@doingfedtime.bsky.social
ExDarknet Vendor/Market Admin/Buyer, Author, YouTuber, Paralegal, Hacker, DefCon/SANS speaker, podcaster, OSINT & OPSEC Specialist, and Content Creator
On a scale of one to 10, this happens to you after you spent this much money...

how pissed are you?
October 13, 2025 at 3:47 PM
My site that lists these and tells you the status of them is:
darkwebdaily.live

dailydwusclfsu7fzwydc5emidexnesmdlzqmz2dxnx5x4thl42vj4qd.onion
October 8, 2025 at 1:01 PM
Run your own: Self-host.
Fund your own: Stack XMR/Real assets
Answer to no one.
Stop watching the propaganda.
"The people are ultimately subordinate to government,
not the other way around,
and that inversion of power is the problem."
- Edward Snowden
September 28, 2025 at 3:19 PM
Do you know?
September 25, 2025 at 12:17 PM
Happy 23rd Birthday Tor.
September 20, 2025 at 6:30 PM
OnionMasq creates VPN-like behavior by trapping applications in kernel-isolated sandboxes where only Tor-routed network interfaces exist, eliminating the bypass vulnerabilities that plague proxy-based solutions.
Based.
www.sambent.com/onionmasq-to...
September 19, 2025 at 2:38 PM
Monero's Atomic Units: How Privacy Money Scales from Piconeros to Meganeros
www.sambent.com/moneros-atom...
#xmr #monero #crypto
September 18, 2025 at 11:17 PM
Cloud password managers aren't protecting your data, they're collecting it for profit while making you the product in a surveillance economy that profits from your digital enslavement.
https://www.sambent.com/vaultwarden-deployment-self-hosted-password-manager-hardening/
September 11, 2025 at 1:01 PM
No man is good enough to govern another man
without that other man’s consent.
- Abraham Lincoln
-
"Mass Extraction
The Widespread Power of U.S. Law Enforcement to Search Mobile Phones"

https://www.upturn.org/work/mass-extraction/
September 10, 2025 at 6:10 PM
BGPStream enables automated BGP hijack detection through real-time routing analysis and CLI automation that identifies prefix hijacking and generates security alerts for network operators.
https://www.sambent.com/bgpstream-hijack-detection-automated-prefix-monitoring-and-alerts/
September 10, 2025 at 1:01 PM
Brave Browser handles 94 million users monthly with zero dependency on Google or Microsoft servers, and Big Tech should be terrified of what this proves.

https://www.sambent.com/monero-ring-size-evolution-privacy-performance-trade-offs/
September 9, 2025 at 6:01 PM
This 1975 paper established "least privilege" and "defense in depth"
as foundational security concepts.
September 9, 2025 at 2:00 PM
Most ECDH implementations contain fatal flaws that let attackers recover private keys through mathematical manipulation.
https://www.sambent.com/ecdh-security-theater-why-most-implementations-fail/
September 5, 2025 at 5:00 PM
Thompson (back in 1984!) shows how to create
self-replicating trojans at the compiler level
that survive source code audits.
https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
September 4, 2025 at 2:01 PM
I2P garlic routing provides enhanced anonymity through multi-layered encryption and timing correlation resistance mechanisms that protect hop metadata and defeat traffic analysis attacks.
https://www.sambent.com/i2p-garlic-routing-hop-metadata-privacy-and-timing-resistance/
September 3, 2025 at 2:50 PM
Piracy unites people instantly.
Happy downloading.
September 2, 2025 at 11:51 AM
Intel Shadow Stack prevents ROP attacks through hardware-enforced call/return matching.
CET shadow stacks can be corrupted through exception handling vulnerabilities.
August 31, 2025 at 2:14 PM
Hardware enclaves provide confidential computing but aren't immune to side channels.
SGX, TrustZone, and AMD SEV all face microarchitectural timing attacks.
August 31, 2025 at 12:27 PM
Microarchitectural load port contention creates covert channels between processes.
Load/store unit scheduling can leak information about concurrent execution.
August 31, 2025 at 10:48 AM
Which technique bypasses modern stack protection through partial pointer overwrites?
Stack canaries can't detect corruption when only function pointer LSBs are modified.
August 30, 2025 at 2:33 PM
Intel Linear Address Masking allows tagged pointers in user space.
LAM enables memory tagging but doesn't prevent all spatial safety violations.
August 30, 2025 at 1:09 PM
ARM Confidential Compute Architecture protects VMs from hypervisor access.
CCA realms provide hardware-enforced isolation but require trusted firmware.
August 30, 2025 at 11:22 AM
theHarvester custom modules enable specialized OSINT collection through LinkedIn enumeration and breach data correlation.
https://www.sambent.com/theharvester-custom-modules-linkedin-enumeration-and-breach-correlation/
August 29, 2025 at 8:50 PM
Introduced the RSA algorithm, a groundbreaking public-key system that underpins much of today's digital security, from secure web browsing to electronic signatures.
https://people.csail.mit.edu/rivest/Rsapaper.pdf
August 29, 2025 at 5:00 PM
CPU prefetcher side channels leak memory access patterns across security boundaries.
Prefetch instructions can be used to probe memory layouts.
August 29, 2025 at 2:48 PM