Rick Valenzuela's Avatar

Rick Valenzuela

@threatc.at

threat detection. distant past: journalist. 🍜 Slurp with gusto http://infosec.exchange/@rv TnFxIHpyIHNiZSBndXIgb3JmZyBpcnRyZ25ldm5hIFRyYXJlbnkgR2ZiJ2YgZXJwdmNyIHZhIGd1ciBoYXZpcmVmcg==

229
Followers
629
Following
80
Posts
14.09.2023
Joined
Posts Following

Latest posts by Rick Valenzuela @threatc.at

This is also more than just travel or other personal situations, but also for private networks like hospitals and warehouses (think of industrial IoT deployments). These things are convenient, but there's no guardrails yet.

link to paper: www.usenix.org/system/files...

19.08.2025 19:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Screenshot from paper: This system is analogous to new car dealerships that purchase cars directly from the manufacturer and sell to consumers.
In the case of a car dealership, the car manufacturer has a serious stake in ensuring that dealerships operate according to strict policies and procedures to avoid tarnishing the brand reputation. In the case of eSIM reselling, users are unlikely to give any consideration to who is managing and operating the eSIM profile they have just downloaded to their mobile device. MNOs and MVNOs appear to be willing to allow any party the opportunity to re-sell access to their networks. The opportunity exists for virtually anyone to establish their own online presence, selling cellular data plans to anyone with an internet connection. This scenario has serious implications for user data privacy.

Screenshot from paper: This system is analogous to new car dealerships that purchase cars directly from the manufacturer and sell to consumers. In the case of a car dealership, the car manufacturer has a serious stake in ensuring that dealerships operate according to strict policies and procedures to avoid tarnishing the brand reputation. In the case of eSIM reselling, users are unlikely to give any consideration to who is managing and operating the eSIM profile they have just downloaded to their mobile device. MNOs and MVNOs appear to be willing to allow any party the opportunity to re-sell access to their networks. The opportunity exists for virtually anyone to establish their own online presence, selling cellular data plans to anyone with an internet connection. This scenario has serious implications for user data privacy.

Alongside possibility of data interception and location tracking and opaque ownership hierarchy of what are essentially white-label resellers, it also looks at the workflow of deploying eSIMs and weak points attackers could hit

19.08.2025 19:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The paper itself is not that China heavy, but it lists a lot of observed traffic routed to different, unexpected countries, including "proactive communication", the phoning-home aspect (tho it also links to a 2021 article discussing this with physical SIMs).

19.08.2025 19:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The article goes hard on the China angle, and for sure: who knew Irish eSIM brand Holafly is actually a subsidiary of the state-owned enterprise China Mobile? The installer runs from their servers, and wherever the phone is, it even has a public IP address in China.

19.08.2025 19:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study Convenient tech brings big bundle of security and privacy risks.

New security risk unlocked, eSIMs edition, and especially the kind you pick up prepping for an international trip

www.itnews.com.au/news/travel-...

19.08.2025 19:36 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Photo- and videojournalists now have until Aug 8 to brush up on Filezilla or Cyberduck, or ask an old head

wetransfer.com/explore/lega...

15.07.2025 14:05 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Rewrite the quote β€œDo not cite the Deep Magic to me, Witch. I was there when it was written” in the voice of Pauly Shore’s character Stoney in Encino Man saying, β€œIf you're edged 'cause I'm weazin all your grindage, just chill. 'Cause if I had the whole brady bunch thing happenin' at my pad, I'd go grind over there, so dont tax my gig so hard-core cruster.”
ChatGPT said:

Sure! Here’s that quote reimagined in the voice and style of Pauly Shore’s Stoney from Encino Man:

"Yo, don’t be throwin' down the Deep Magic vibes at me, buuuddy. I was totally chillin’ when they laid it down, saw the whole scroll sesh go down, major OG incantation action, ya know? So don’t harsh my mystical mellow, crusty sorceress."

Let me know if you want it even more surfer-stoner or pulled back a bit!

Rewrite the quote β€œDo not cite the Deep Magic to me, Witch. I was there when it was written” in the voice of Pauly Shore’s character Stoney in Encino Man saying, β€œIf you're edged 'cause I'm weazin all your grindage, just chill. 'Cause if I had the whole brady bunch thing happenin' at my pad, I'd go grind over there, so dont tax my gig so hard-core cruster.” ChatGPT said: Sure! Here’s that quote reimagined in the voice and style of Pauly Shore’s Stoney from Encino Man: "Yo, don’t be throwin' down the Deep Magic vibes at me, buuuddy. I was totally chillin’ when they laid it down, saw the whole scroll sesh go down, major OG incantation action, ya know? So don’t harsh my mystical mellow, crusty sorceress." Let me know if you want it even more surfer-stoner or pulled back a bit!

16.05.2025 21:41 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Video thumbnail

Continue nudging the feed

16.05.2025 21:00 πŸ‘ 4 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

And plug: I mentioned Lockdown Mode and Advanced Protection Program in a tip sheet I cowrote with @bostonjoan.bsky.social for @criticalinternet.bsky.social. If you fit the profile, these are really good and really easy things to switch on to be safer

16.05.2025 15:27 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Android 16's Advanced Protection security mode: What it does and who should enable it If you value security, you'll want to turn on the new Advanced Protection mode in Android 16. Here's what it does and how to enable it.

For a comprehensive and straightforward explanation of all the things that Advanced Protection does on mobiles, @androidauthority.com has an excellent overview

16.05.2025 15:19 πŸ‘ 2 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Preview
Advanced Protection: Google’s Strongest Security for Mobile Devices Posted by Il-Sung Lee, Group Product Manager, Android Security Protecting users who need heightened security has been a long-standing com...

Android users now have an analog to iPhone's Lockdown Mode, so now basically everyone can opt in to a more secure phone/tablet. It's part of Google's Advanced Protection Program, which if you use Gmail and work/move in a space where you're more likely to be targeted, is a great thing to enroll in

16.05.2025 15:19 πŸ‘ 5 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0

Please next Peep-flavored prawn crackers

05.05.2025 15:46 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Photo appears to show Mike Waltz using Signal-like app that can archive messages More than a month after he drew criticism for using Signal to discuss an impending military attack, Waltz was seen using what appears to be a different messaging app to message others in the Trump adm...

I've been traveling so forgive me for not posting this yesterday, but: That Signal clone app for archiving messages that Mike Waltz has been using, TeleMessage? It's unlicensed. Signal was unaware of its existence until they saw it in that Reuters photo. There's no known security vetting.

03.05.2025 15:56 πŸ‘ 3363 πŸ” 1321 πŸ’¬ 88 πŸ“Œ 148

Ugh. If this is pattern behavior (or policy?), then maybe links to CBS News stories should be to free archive link versions instead

03.05.2025 03:25 πŸ‘ 8 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
These judges ruled against Trump. Then their families came under attack. As federal judges rule against the Trump administration in dozens of politically charged cases, the families of at least 11 of the jurists have been targeted with threats and harassment. The intimidation campaign has strained judges and their relatives – and legal scholars fear it could have a chilling effect on the judiciary.

Great account of what networked incitement looks like in the year 2025. Kudos to @nedmparker1.bsky.social, @mikespector.bsky.social, @bypetereisler.bsky.social, @lindasoreports.bsky.social & @nateraymond.bsky.social

02.05.2025 21:35 πŸ‘ 9 πŸ” 4 πŸ’¬ 1 πŸ“Œ 1
Chart describing Air Quality Index (AQI) values. Read the whole thing at https://www.lung.org/clean-air/outdoors/air-quality-index

Chart describing Air Quality Index (AQI) values. Read the whole thing at https://www.lung.org/clean-air/outdoors/air-quality-index

Heat map chart of AQI in Shanghai, showing 19 days at 100 or more in January 2018.

Heat map chart of AQI in Shanghai, showing 19 days at 100 or more in January 2018.

I did this in Shanghai circa 2018, when the AQI was horrendous (second pic). Above 100 was common, and an occasional spike above 400. Airnow.gov has Barnegat at 63 and forecast for 100

24.04.2025 17:26 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
How to Make a DIY Air Purifier for Your Home – Smart AirFacebook social iconTwitter social iconInstagram social iconLinkedIn social iconYouTube social icon 5 Simple Steps to make a homemade DIY air purifier to reduce air pollution and viruses in your home--plus actual test data showing the DIY filter works.

For my NJ people who would want to know this, really good air filters don't have to be expensive. Literally talking ~$30. In front of a strong fan, stack an activated carbon filter on top of a HEPA filter and that will screen out both the things you want, volatile organic compounds (VOCs) and PM2.5

24.04.2025 17:26 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

a bundle of leeks πŸ’€

Also a possible new unit of measurement. Would be nice if it's a round number, too; he's currently 1 Truss, 4 Scaramuccis in

24.04.2025 10:55 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

you guys watching Office Space?

23.04.2025 11:52 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
a woman in a car with the words i see you seeing me see you on the bottom ALT: a woman in a car with the words i see you seeing me see you on the bottom
21.04.2025 14:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
a black and white photo of a man with a stethoscope around his neck screaming . ALT: a black and white photo of a man with a stethoscope around his neck screaming .
21.04.2025 14:00 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

test II

21.04.2025 13:55 πŸ‘ 2 πŸ” 0 πŸ’¬ 3 πŸ“Œ 0

Awww. But credit goes to an unnamed group chat (not that one but also that one)

21.04.2025 06:32 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Snitches gets kittehs

02.04.2025 00:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
The Drake Hotline Bling meme template (the rapper Drake wearing a bright orange puffy coat against a yellow background, turning away and holding up his hand in the top photo, smiling and pointing β€œyes” in the bottom photo): the top text reads β€œOPSEC” and the bottom text reads β€œOOPSEC”

The Drake Hotline Bling meme template (the rapper Drake wearing a bright orange puffy coat against a yellow background, turning away and holding up his hand in the top photo, smiling and pointing β€œyes” in the bottom photo): the top text reads β€œOPSEC” and the bottom text reads β€œOOPSEC”

The U.S. IC (at least the leadership)

01.04.2025 19:53 πŸ‘ 52 πŸ” 14 πŸ’¬ 1 πŸ“Œ 0

Just popping in to say Spolsky theme is the best dark theme for vim or emacs

30.03.2025 20:31 πŸ‘ 7 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

No-goodnik was always in Mad magazines of the 1970s.

Also, this is probably a good place to mention the Russian term 'vatnik'. Good word, much usable

27.03.2025 18:03 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Excerpt: If you can get a separate phone, you maywant to run that stripped down to essentials, with a minimal contact list and only necessary communication apps, potentially with separate accounts.
This isn't a burner phone; if you think you need to go to that level, you'll have to actively do a lot more planning and care for the steps you take. Watch a 3-part series from Black Hills Information Security titled "How to Live like a Criminal - Privacy Tips for the Non-Criminal". It covers a lot more ground on planning to purchase and activate a bumer and the risks to safely maintain it, as well as awareness of how much information on you from data brokers would be available β€” whether to law enforcement, other investigators, or criminals.

Excerpt: If you can get a separate phone, you maywant to run that stripped down to essentials, with a minimal contact list and only necessary communication apps, potentially with separate accounts. This isn't a burner phone; if you think you need to go to that level, you'll have to actively do a lot more planning and care for the steps you take. Watch a 3-part series from Black Hills Information Security titled "How to Live like a Criminal - Privacy Tips for the Non-Criminal". It covers a lot more ground on planning to purchase and activate a bumer and the risks to safely maintain it, as well as awareness of how much information on you from data brokers would be available β€” whether to law enforcement, other investigators, or criminals.

Lotta talk now about burner phones (and nerds saying what isn't). You don't need to go super cloak and dagger for decent risk reduction. But if you want to, listen to @eanmeyer.bsky.social and @strandjs.bsky.social from @bhinfosecurity.bsky.social

www.youtube.com/playlist?lis...

25.03.2025 16:15 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Excerpt: Protester
If you're going to attend a protest and feel uncertain about your communications, the most basic thing you could do is leave your phone at home, or turn it off completely while at the protest site. Make sure that you have a good passcode set to unlock your phone or laptop, as fingerprints or FacelD can be bypassed easily by force or coercion. Disable unlocking by fingerprint or facial recognition.
If you have an iPhone, also consider turning on Lockdown Mode. This would disable 2G, an older form of cellular connection, which is commonly used as a fallback. Android users can explicitly disable 2G in settings too. These connections aren't encrypted and are susceptible to interception, such as from IMSI-catchers, sometimes called by a brand name Stingray.

Excerpt: Protester If you're going to attend a protest and feel uncertain about your communications, the most basic thing you could do is leave your phone at home, or turn it off completely while at the protest site. Make sure that you have a good passcode set to unlock your phone or laptop, as fingerprints or FacelD can be bypassed easily by force or coercion. Disable unlocking by fingerprint or facial recognition. If you have an iPhone, also consider turning on Lockdown Mode. This would disable 2G, an older form of cellular connection, which is commonly used as a fallback. Android users can explicitly disable 2G in settings too. These connections aren't encrypted and are susceptible to interception, such as from IMSI-catchers, sometimes called by a brand name Stingray.

One of the risk profiles is protesters. For them, and for more users and reasons, iPhone users should turn on Lockdown Mode. In this context, it's about IMSI catchers, which intercept calls. @eff.org just released a tool for this, and it's worth reading about, and using
www.eff.org/deeplinks/20...

25.03.2025 16:15 πŸ‘ 4 πŸ” 1 πŸ’¬ 1 πŸ“Œ 1
Multifactor Authentication
Again, any is better than none, but here the differences are significant. The simplest of these are getting codes sent by email, phone call or text message. A level up rould be using an app that generates codes. Another level up is an app that prompts /ou to accept or deny the login, and the highest security would come from a physical object, whether that's a piece of hardware in a USB key or from the built-in security chip that's made for this embedded in your phone or computer. A great chart and rundown of these are written in this blog post by security researcher Daniel Miessler.

Multifactor Authentication Again, any is better than none, but here the differences are significant. The simplest of these are getting codes sent by email, phone call or text message. A level up rould be using an app that generates codes. Another level up is an app that prompts /ou to accept or deny the login, and the highest security would come from a physical object, whether that's a piece of hardware in a USB key or from the built-in security chip that's made for this embedded in your phone or computer. A great chart and rundown of these are written in this blog post by security researcher Daniel Miessler.

Spoiler: One of the 5 things is using MFA. It's been a decade since learning this one thing could've prevented John Podesta from losing control of his Gmail. @danielmiessler.bsky.social wrote a great breakdown of options, so this section doesn't reinvent the wheel
danielmiessler.com/blog/not-all...

25.03.2025 16:15 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0