r/darknetdiaries

I'm obsessed with privacy, owning my identity and web security

I’ve probably listened to every episode, and I’ve spent years thinking about how to solve the problems we have on the web.

After working on a peer-to-peer compute network idea for the last three years, I think I’ve finally found the core issue:

We give systems too much access by default, then spend the rest of our time trying to claw that access back with permissions, firewalls, TLS, access control, routing rules, configuration layers, and increasingly fragile infrastructure.

Each layer creates new problems.

TLS creates routing complexity.
Routing creates configuration complexity.
Configuration complexity creates lazy admin shortcuts.
Lazy admin shortcuts create security failures.

My core realization is simple:

We need identity-based routing.

Your identity should be your public key. Any data meant for you should be sealed directly to you as the recipient.

That changes the whole model.

If the message content is already encrypted to the recipient, we no longer need to care as much if the message is captured, stored, routed through the wrong machine, or temporarily handled by an untrusted relay. The relay can move the packet, but it cannot read it.

The missing piece is incentives.

Nobody wants to relay traffic for free forever. But it should be possible to account for relay work without revealing message contents. In the simplest form:

I relay your messages.
You relay mine.
The network can prove useful work happened without exposing private data.

From there, the model becomes much more powerful.

Your device has an identity.
Your apps have identities.
Your data is sealed to the identities that are allowed to access it.
Even in failure cases, the blast radius becomes much smaller.

Instead of trusting platforms, cloud providers, app stores, and tech giants with everything by default, we could join our devices into a global overlay network where identity, routing, compute, and data ownership are built from the ground up around cryptographic control.

The goal is apps that can run anywhere, on any platform, while the user remains the guardian of their identity and data.

I know this sounds naive. I know it sounds too broad. But I’ve been building toward this for years.

The repo is here:
https://github.com/Sylchi/edgerun-c

The long-term goal is simple:

A world where people can run software freely, communicate privately, share compute voluntarily, and stop giving 30% of their digital lives to tech giants just because the current web architecture made that the default.

u/Successful_Option_77 — 2 days ago

Darknet Diaries x Coffeezilla

Even though coffee is not really cyber adversed, I bet he has at least some storys to tell, as he has a relatively high exposure to fraudsters and criminals. Also I bet they would be vibing.

reddit.com
u/genesisit — 3 days ago

How does Jack Choose His Stories?

I was wondering how Jack chooses the material for his stories. Of course, this is something that only he could answer, and I don't know how responsive he is on social media.

There's this one case, that's still ongoing, about an ex-LAPD officer who was caught and charged with kidnapping for ransom. His name is Eric Halem, and apparently he orchestrated a Bitcoin heist. He and four accomplices, including one who's supposedly tied to the Israeli underground, entered an underage kid's apartment, handcuffed both he and his girlfriend, and forced him to transfer $300k worth of Bitcoin.

I actually know this guy, we worked together nearly 20 years ago, and I honestly never thought he had it in him to do shit like that. He's from a well-off family, grew up in an affluent neighborhood, went to college in Riverside, and had started a couple of businesses, including a luxury car rental business.

But, the part of the story that I'm interested in is not about Eric Halem. I already know his story, a number of articles detail what happened prior to his arrest, including a previous arrest for which he was still under investigation for committing insurance fraud (in connection to his luxury car business). You can look up his case online as well.

I'm actually interested in the other side of the story. The kid who he stole from and kidnapped for ransom, he was 17 at the time of the heist, had his own apartment in Korea Town, and $300k worth of Bitcoin. How does a 17 year old kid have this amount of Bitcoin at that age!? One of the articles mentions that Halem's attorney wanted to have the charges dropped, because the kid supposedly admitted in court that he had acquired the Bitcoin through fraud. Of course, since the kid wasn't on trial, those details weren't relevant to Halem's criminal case, meaning that whatever means the kid used to get that much Bitcoin has no impact on Halem's actions.

I wonder if Jack could get a hold of him and at least get his side of the story.

reddit.com
u/Ok_Reserve4109 — 5 days ago

Apple’s Security Has Been Tough to Crack. Mythos Helped Find a Way In.

Security researchers say they have discovered a new way of circumventing Apple’s state-of-the art security technology, using techniques they discovered while testing an early version of Anthropic’s Mythos AI software in April.

The researchers with Calif, a Palo Alto-based security research company, say the software they wrote links together two bugs and a handful of techniques to corrupt the Mac’s memory and then gain access to parts of the device that should be inaccessible.

It is what’s known as a privilege escalation exploit, and if it were chained together with other attacks it could be used by a hacker to seize control of the computer.

The technique is noteworthy because Apple has put so much effort into locking down MacOS, said Michał Zalewski, a security researcher who formerly worked at Google and who reviewed the Calif research but wasn’t involved in the testing.

Apple, which is deploying and testing frontier AI models to test and patch vulnerabilities, is reviewing the Calif report to validate its findings. “Security is our top priority, and we take reports of potential vulnerabilities very seriously,” a company spokeswoman said.

The bug-finding capabilities of the latest AI models from companies such as Anthropic and OpenAI have improved enough in recent months that many cybersecurity experts are now warning of a Bugmageddon, an unprecedented rash of security vulnerability discoveries that could cause headaches for the technology staffers who must patch them, and also represent an unprecedented cybersecurity risk.

Earlier this year, Anthropic’s AI found over 100 high-severity vulnerabilities in the Firefox browser over a two-week period. That is how many the rest of the world typically finds in two months.

Last September, Apple said it leveraged its hardware and operating system expertise into a technology called Memory Integrity Enforcement (MIE), which it described as “the culmination of an unprecedented design and engineering effort, spanning half a decade.”

With Claude, building the code that exploited the two MacOS bugs took five days, Calif says.

The attack couldn’t have been pulled off by Mythos alone and leveraged the very human cybersecurity expertise of some of Calif’s hackers, said Thai Duong, the company’s chief executive. That is because Mythos excels at reproducing previously documented attacks. “We haven’t seen cases where it comes up with new attack techniques,” he said. “This is kind of a new thing.”

While some of the hype around Mythos is “overblown,” Zalewski said it is possible to use the latest tools for “meaningful vulnerability research and code auditing.”

Researchers with the company were so excited about their discovery, they drove down from Palo Alto in person Tuesday to Apple’s Cupertino headquarters to present their 55-page report describing the bugs it exploited. 

Researchers Bruce Dang, in glasses, and Thai Duong at Apple's Cupertino headquarters on Tuesday. Calif

They plan to release details of their attack once Apple has patched the underlying issues. The bugs will likely be fixed pretty quickly, Duong said.

The White House initially opposed Anthropic’s efforts to gradually expand access to Mythos, and concerns about the power of newer AI models have upended the administration’s AI strategy, causing a reassessment of its laissez-faire approach to AI development. Federal officials are now contemplating an executive order that would grant the government oversight of the most-advanced models.

wsj.com
u/Weather — 7 days ago

Episode idea: Shiny Hunters

So this is kinda a as it happens idea, as the topic is the hacker group Shiny Hunters. They been around since 2020 and have done some intresting breaches like Rockstar games, carguru, and mathway. All of which they stole data and threatened to leaked they data unless the companies paid the ransom, which most didnt so they then did leak said data. Though very recently they have breached and affected around 9000 schools across the U.S including Harvard, Duke, and many other well known names. Im currently working with the issue myself as I work at one of the said affected colleges. Though im also looking for more insight myself as well as other thoughts and opinions on the idea. Thank yall, and have a great day.

reddit.com
u/Suspicious_Main_6932 — 14 days ago

Canvas cyberattcked

(Typo in title sry 🥲) As we (students) all know… canvas, a widely used learning platform, recently got hacked. Wondering if this will be a good episode? Like if there’s a lot to cover about it.

reddit.com
u/runfreelyactwildly — 14 days ago