@mrkoot Profile picture

Matthijs R. Koot

@mrkoot

IT, privacy, security, democracy. PhD. @SecuraBV / @UvA_Amsterdam. PGP: 51F9 8FC9 C92A 1165 (https://t.co/ChpxzwV9PR). Mastodon: @[email protected]

Joined January 2011
Similar User
Hunt & Hackett photo

@huntandhackett

HD Moore photo

@hdmoore

NJ photo

@ToolsWatch

NCSC-NL photo

@ncsc_nl

Paul Rascagnères photo

@r00tbsd

Cqure photo

@cqure

Niels Groeneveld photo

@nigroeneveld

Bart Schellekens photo

@BartSchellekens

Rob Fuller photo

@mubix

Wesley photo

@wesleyneelen

Dr. Anton Chuvakin photo

@anton_chuvakin

Jan-Jaap Oerlemans photo

@jjoerlemans

@mikko photo

@mikko

Lenny Zeltser photo

@lennyzeltser

Edwin van Andel  photo

@Yafsec

Matthijs R. Koot Reposted

The @FBI announce a $10 m award for information leading to the arrest of GRU Unit 29155 hackers who targeted Ukrainian gov't infrastructure at the start of the invasion. They are all familiar faces to us, will do a story on them in the next few days.

Tweet Image 1
Tweet Image 2

Matthijs R. Koot Reposted

We have released the 31 GB of North Korean leaked data from their cloud server. This data set mentioned in the 38north article. gofile.io/d/nLSE4n @38northnk @martyn_williams @nknewsorg @RecordedFuture @lorenzofb @josephfcox @vxunderground @BushidoToken @thegrugq


Matthijs R. Koot Reposted

This is allegedly threat actor USDoD.

Tweet Image 1

🚨🚨🚨USDoD has allegedly had his identity doxed. hackread.com/usdod-hacker-s…



Matthijs R. Koot Reposted

Damn. This guy was a human rights activist and cofounder of a significant pro-democracy organization named for victims of the Tiananmen Square massacre. He was also an MSS spy reporting to the PRC on the activities of those who joined as far back as at least 2006.

Federal Jury Convicts New York Resident of Acting as a Covert Chinese Agent Defendant Pretended to Be Opposed to the Chinese Government So He Could Get Close to Prominent Activists Seeking to Bring Democracy, Reform and Human Rights to China 🔗: justice.gov/opa/pr/new-yor…

Tweet Image 1


Matthijs R. Koot Reposted

De Amerikaanse FBI heeft in samenwerking met de Nederlandse AIVD, de MIVD en de politie een Russisch desinformatienetwerk ontmanteld. Bijna 1000 nep-twitteraars zijn ontmaskerd. #Nieuwsuur


Matthijs R. Koot Reposted

New essay: ML seems to promise discovery without understanding, but this is fool's gold that has led to a reproducibility crisis in ML-based science. aisnakeoil.com/p/scientists-s… (with @sayashk). In 2021 we compiled evidence that an error called leakage is pervasive in ML models…

Tweet Image 1
Tweet Image 2

Matthijs R. Koot Reposted

Respectfully, your proposal does break encryption. I am happy to spend as much time as you need reviewing in as much detail as you are comfortable with exactly how it breaks encryption, and why this is so dangerous.

Let me clarify one thing about our draft law to detect online child sexual abuse #CSAM. Our proposal is not breaking encryption. Our proposal preserves privacy and any measures taken need to be in line with EU privacy laws.



Invited speakers for @Ei_PSI Security in Times of Surveillance event at TU Eindhoven (NL) on Fri 31 May 2024: Wouter Bokslag (Midnight Blue) Stephen Farrell (Trinity College Dublin) @xotoxot (RU) Carlo Meijer (Midnight Blue) @bpreneel1 (KU Leuven) More: win.tue.nl/eipsi/surveill…


Covert Connections: The LinkedIn Recruitment Ruse Targeting Defense Insiders (8 May 2024) airuniversity.af.edu/JIPA/Display/A… Direct link to paper (.pdf, 24 pages): media.defense.gov/2024/May/07/20…

Tweet Image 1

Matthijs R. Koot Reposted

"art...of Sigint happens a lot further back than the point at which... reports are produced, much as a military... achieving significant effect on the battlefield owes almost everything to what had happened in the background, over a long period of time" siginthistorian.blogspot.com/2024/05/enviro…


Matthijs R. Koot Reposted

A good post on why SIGINT agencies can't just switch targets on a dime. An agency "has to expend significant resource to maintain the environmental information that enables it to turn into an intelligence producer when a target turns active" siginthistorian.blogspot.com/2024/05/enviro…


Russia’s Declining Satellite Reconnaissance Capabilities and Its Implications for Security and International Stability (8 May 2024) doi.org/10.1080/088506… By Elena Grossfeld (@kloosha), PhD candidate at KCL, in Int'l Journal of Intel & CounterIntel (@Intel_IJIC). Open Access.

Tweet Image 1

Matthijs R. Koot Reposted

Example of a possible information/propaganda operation. This week a defector fled Poland for Belarus. The said person is a pretty high-rank judge. He had access to top secret information and inevitably holds sensitive knowledge about multiple matters. He was also close to…

Tweet Image 1

Matthijs R. Koot Reposted

This cites Chris Wray's comments on Volt Typhoon. That is a Chinese cyber campaign to position malware inside US critical infrastructure to enable sabotage. To conflate this with a hack of UK MoD payroll data & group both as "cyber war" is ridiculous. telegraph.co.uk/news/2024/05/0…

China's cyber war on the West escalating telegraph.co.uk/news/2024/05/0…



Matthijs R. Koot Reposted

BBC News - Polish security finds bugs in cabinet meeting room - BBC News bbc.co.uk/news/articles/…


Commercial Enablers of China’s Cyber-Intelligence and Information Operations (2024) digitalcommons.usf.edu/mca/vol7/iss1/… Published in Military Cyber Affairs, Vol. 7, Issue 1. Direct link to paper (0.5MB .pdf, 12 pages) digitalcommons.usf.edu/cgi/viewconten…

Tweet Image 1

Matthijs R. Koot Reposted

A joint investigation by Amnesty International and Haaretz has revealed that Indonesia, which has no diplomatic ties with Israel, imported Israeli spy tech. Then Singapore found out about it / @omerbenj haaretz.com/israel-news/se…


Matthijs R. Koot Reposted

Global: A Web of Surveillance – Unraveling a Murky Network of Spyware Exports to Indonesia Jurre van Bergen (@DrWhax), Technologist at @Amnesty, said: amnestyusa.org/press-releases…


The announcement you've all been waiting for: Our next Security in Times of Surveillance event will happen 31 May 2024. Stay tuned for updates on speakers. Registration will open soon.

Tweet Image 1


The Belarusian Cyber-Partisans hacker activist group “claims to have infiltrated the network of the country’s main KGB security agency and accessed personnel files of over 8,600 employees of the organization” (27 April 2024) apnews.com/article/belaru…


Loading...

Something went wrong.


Something went wrong.