We talked with Dr. Valentin Weber about his research on secure messenger services inside the PLA, their flaws and limitation and how a system obsessed with surveillance, even compromises on security to keep tabs on what their soldiers talk about: open.substack.com/pub/netaskar...
28.01.2026 16:17
👍 3
🔁 1
💬 0
📌 0
What's in the box !?
NetAskari got access to a little "toolbox" of a Chinese red-team/pen-tester. Let's explore.
Chinese pen-testers know about the Chinese eco system as much as they know about western tools and techniques. While western researchers often never step inside the Chinese world of red-teams: tinyurl.com/48z9etwk
19.01.2026 12:13
👍 1
🔁 1
💬 0
📌 0
See how Chinese red-team / pen-testers see China's e-government infrastructure and witness how they assess security flaws in the govt run service infrastructure ( has diagrams and pictures ) : tinyurl.com/ynp4ahzk
12.01.2026 14:42
👍 0
🔁 0
💬 0
📌 0
Read the full report here 9/9: netaskari.substack.com/p/chinas-gua...
06.01.2026 08:47
👍 0
🔁 0
💬 0
📌 0
5. Provide granular access control to specific files, for user-device combos, based on daily use and launching alerts if those rules are broken. Even enabling automated shutdown of client system if rule breaking is detected. 8/9
06.01.2026 08:47
👍 0
🔁 0
💬 1
📌 0
4. Monitor http, ftp and smtp traffic from a client to see for example if the user logs into web email systems ( and stores login to those systems ) or if otherwise trying to get files "off device". 7/9
06.01.2026 08:47
👍 0
🔁 0
💬 1
📌 0
3. Provide an enumeration and overview of confidential files found on a client machine plus the ability to remotely delete them by an administrator or supervisor. 6/9
06.01.2026 08:47
👍 0
🔁 0
💬 1
📌 0
2. Scan content on a client along a combination of list-fed and hardcoded keywords, especially text based documents ( docx, pdf, http, txt, md, xlsx etc. ) 5/9
06.01.2026 08:47
👍 0
🔁 0
💬 1
📌 0
1. Kill processes that might jeopardize or bypass the tool's ability to oversee the data integrity of a client system. 4/9
06.01.2026 08:47
👍 0
🔁 0
💬 1
📌 0
It was build by the well known Chinese cyber security government SuperRed but relies heavily on open source technology to provide its core functionality. 3/9
06.01.2026 08:47
👍 0
🔁 0
💬 1
📌 0
Designed mainly for WinXP and Win7, it lodges itself rather deep inside the system to have full file system access, controls hardware/USB devices, dynamic content analysis and enumeration, provides network traffic proxies and enables remote control and granular file behavior. 2/9
06.01.2026 08:47
👍 0
🔁 0
💬 1
📌 0
We got our hand on a Chinese DLP program the government and national security agencies use to monitor state employees computers for leakage and usage of confidential documents. Meet 保密管理系统. 1/9
06.01.2026 08:47
👍 0
🔁 0
💬 1
📌 0
Why do so little internal documents leak from China, compared to its sizable digital administrative infrastructure ? NetAskari got their hands on an internal document monitoring and control software for government workstations: open.substack.com/pub/netaskar...
04.01.2026 11:24
👍 0
🔁 0
💬 0
📌 0
As the year is coming to an end, here are our picks of the five best stories on netaskari.online . If you have some time over the holidays, please check them out: open.substack.com/pub/netaskar...
23.12.2025 09:41
👍 1
🔁 0
💬 0
📌 0
An example of an HikVision powered neighborhood surveillance and access-control system, that you can find all across China's cities. In the past often stand-alone, they are increasingly getting integrated into the nation wide "Sharp eyes" ( 雪亮 ) project.
15.12.2025 22:31
👍 1
🔁 0
💬 0
📌 0
Read our primer on how the big-data analysis system operated by the Chinese police can track people across country, via having almost real time access to their means of travel, bank account activities, phone calls and online activity. netaskari.substack.com/p/smart-poli...
08.12.2025 15:25
👍 1
🔁 0
💬 0
📌 0
China’s hacking training grounds, gunning or foreign nations’ critical infrastructure: tinyurl.com/y67z79ve
26.11.2025 08:42
👍 0
🔁 0
💬 0
📌 0
The FBI is weighing an arrest and perp walk for Comey — and suspended an agent for refusing to help, sources say
The FBI is considering carrying out a "showy" arrest and perp walk of the agency's now-indicted ex-Director James Comey, sources tell CBS News.
“The source told CBS News that [Kash Patel and Dan Bongino] asked for "large, beefy" agents to conduct an arrest of Comey "in full kit," including Kevlar vests and exterior wear emblazoned with the FBI logo.” The leadership of the FBI is now in the hands of infantile psychopaths.
04.10.2025 03:26
👍 3192
🔁 981
💬 165
📌 225
Xinjiang 912: The evolution of the Great Firewall forged in one of the world’s most surveilled and controlled regions. open.substack.com/pub/netaskar...
02.10.2025 13:06
👍 0
🔁 0
💬 0
📌 0
We took a stroll among the less sexy “study” documents of MESA Lab but still found some interesting little nuggets on the future of China’s cyber strategy and developments : open.substack.com/pub/netaskar...
30.09.2025 05:37
👍 0
🔁 0
💬 0
📌 0
U.S. government scrambles to stop new hacking campaign blamed on China
U.S. cybersecurity officials ordered civilian federal agencies to check for vulnerable Cisco equipment being exploited by attackers targeting the government.
Federal agencies are racing to contain a new wave of sophisticated hacking by suspected Chinese attackers that took advantage of previously undiscovered flaws in widely used security software from networking company Cisco.
26.09.2025 05:00
👍 75
🔁 32
💬 12
📌 2