UK Is Ordering Apple to Break Its Own Encryption

The Washington Post is reporting that the UK government has served Apple with a “technical capability notice” as defined by the 2016 Investigatory Powers Act, requiring it to break the Advanced Data Protection encryption in iCloud for the benefit of law enforcement.

This is a big deal, and something we in the security community have worried was coming for a while now.

The law, known by critics as the Snoopers’ Charter, makes it a criminal offense to reveal that the government has even made such a demand. An Apple spokesman declined to comment…

February 8, 2025
Read More >>

Pocket Rockets — Requirements and Challenges

This is post 1 of 4 in the series “Pocket Rockets” Pocket Rockets — Requirements and Challenges Pocket Rockets — Mobility Options Pocket Rockets — Towing Vehicles Pocket Rockets — Growth and Summary A short series that examines options for …

February 8, 2025
Read More >>

HackTheBox:MagicGardens Machine Walkthrough-Insane Difficulty

Introduction to MagicGardens: This write-up will explore the “MagicGardens” machine from Hack The Box, which is categorized as an insanely difficult challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective on MagicGardens machine: The goal of this walkthrough is to complete the “MagicGardens” machine from Hack […]

The post HackTheBox:MagicGardens Machine Walkthrough-Insane Difficulty appeared first on Threatninja.net.

February 8, 2025
Read More >>

Active Conflicts & News MegaThread February 08, 2025

The r/CredibleDefense daily megathread is for asking questions and posting submissions that would not fit the criteria of our post submissions. As such, submissions are less stringently moderated, but we still do keep an elevated guideline for comments.

Comment guidelines:

Please do:

* Be curious not judgmental,

* Be polite and civil,

* Use capitalization,

* Link to the article or source of information that you are referring to,

* Clearly separate your opinion from what the source says. Please minimize editorializing, please make your opinions clearly distinct from the content of the article or source, please do not cherry pick facts to support a preferred narrative,

* Read the articles before you comment, and comment on the content of the articles,

* Post only credible information

* Contribute to the forum by finding and submitting your own credible articles,

Please do not:

* Use memes, emojis nor swear,

* Use foul imagery,

* Use acronyms like LOL, LMAO, WTF,

* Start fights with other commenters,

* Make it personal,

* Try to out someone,

* Try to push narratives, or fight for a cause in the comment section, or try to ‘win the war,’

* Engage in baseless speculation, fear mongering, or anxiety posting. Question asking is welcome and encouraged, but questions should focus on tangible issues and not groundless hypothetical scenarios. Before asking a question ask yourself ‘How likely is this thing to occur.’ Questions, like other kinds of comments, should be supported by evidence and must maintain the burden of credibility.

Please read our in depth rules https://reddit.com/r/CredibleDefense/wiki/rules.

Also please use the report feature if you want a comment to be reviewed faster. Don’t abuse it though! If something is not obviously against the rules but you still feel that it should be reviewed, leave a short but descriptive comment while filing the report.

submitted by /u/AutoModerator
[link] [comments]

February 8, 2025
Read More >>

Teen on Musk’s DOGE Team Graduated from ‘The Com’

Wired reported this week that a 19-year-old working for Elon Musk’s so-called Department of Government Efficiency (DOGE) was given access to sensitive US government systems even though his past association with cybercrime communities should have precluded him from gaining the necessary security clearances to do so. As today’s story explores, the DOGE teen is a former denizen of ‘The Com,’ an archipelago of Discord and Telegram chat channels that function as a kind of distributed cybercriminal social network for facilitating instant collaboration.

February 8, 2025
Read More >>

UL Top 10 AI Risks (v1)

Given the speed of AI improvement and adoption, it’s hard for most people to know what to be concerned about, and what to do about it.
Sometimes the risk is doing too much too fast, and sometimes it’s not doing enough fast enough.In this resource I wi…

February 8, 2025
Read More >>