Julian Klode
Canonical's GRUB Saboteur Has a 10-Year Plan
Julian Klode has been systematically stripping features from GRUB since 2021, and he built the replacement a decade ago.
Julian Klode
Julian Klode has been systematically stripping features from GRUB since 2021, and he built the replacement a decade ago.
I2P
Every I2P packet takes 12 hops just to complete a round trip, and the streaming library has to fake TCP on top of all that latency.
tails
Tails 7.6 uses domain fronting to hide Tor bridge requests from censors, replaces KeePassXC with GNOME Secrets for accessibility, and catches up on 18 months of Electrum releases.
Microsoft
Microsoft spent four years stuffing Windows 11 with ads, forced Copilot integrations, and bloatware, now they want applause for promising to remove it.
age verification
Dylan, useful idiot with commit access, pushed age verification PRs to systemd, Ubuntu & Arch, got 2 Microslop employees to merge it, called it 'hilariously pointless' in the PR itself, then watched Lennart personally block the revert. Unpaid compliance simp.
privacy
Amazon just canceled Ring's partnership with Flock Safety, a surveillance company operating over 100,000 automated license plate reader cameras across 49 states that scan more than 20 billion plates per month. The deal would have allowed law enforcement to request Ring doorbell footage through Flock's
dark web
James Ettleson ordered meth through dark web markets then advertised it on Facebook, earning 100 months in federal prison.
Darknet & Darkweb News, OpSec, OSINT and More
Proton has handed over user data in response to over 40,000 government orders since 2017. Their own transparency report shows a 94% compliance rate. Here's everything they don't want you to know, sourced from their own documents.
OpenClaw has racked up over 160 security advisories in the past year, excludes the primary attack vector from their security model, and has no bug bounty program. This is security in name only.
The unidirectional tunnel requirement in I2P means a simple request-response involves four distinct paths, and garlic routing optimizes this architecture by packaging multiple messages together for efficient transport.
Dread is running a writing contest with $1,750 in Monero prizes and one very specific ban: AI-generated content.
Apple rolled identity verification into iOS 26.4 for UK users under the Online Safety Act, requiring credit card scans or government photo ID to confirm users are over 18. If you decline, app downloads and in-app purchases get restricted on a phone you already own. The system is expanding
Tails 7.5 upgrades to Tor 0.4.9.5 with Counter Galois Onion encryption and patches over 30 high-severity Firefox vulnerabilities through Tor Browser 15.0.7.
On February 3, 2026, the I2P anonymity network was flooded with 700,000 hostile nodes in what became one of the most devastating Sybil attacks an anonymity network has ever experienced. The network normally operates with 15,000 to 20,000 active devices. The attackers overwhelmed it by a factor
Tor Browser 15.0.6 ships with Counter Galois Onion circuit encryption that eliminates tagging attacks, plus a heap buffer overflow patch from Firefox ESR 140.7.1.
Whonix 18.1.4.2 disables VirtualBox dynamic resolution by default after developers discovered the auto-resize feature creates unique fingerprints that persist across reboots.
A criminal proxy service openly bragged "Working since 2004!" on its homepage while the FBI apparently had other priorities for two decades.
A botnet that broke DDoS records at 31.4 terabits per second accidentally crippled I2P's anonymity network while trying to use it as a backup command infrastructure, and the developers responded with post-quantum cryptography enabled by default.
Tails 7.4.2 ships as the second emergency release in 12 days, patching 169 Linux kernel CVEs that could let an attacker escalate from a compromised application to full system control.