Sam Bent's avatar
Sam Bent
contact@sambent.com
npub1y7rv...d0r3
Journalist | OSINT & OPSEC Specialist | Darknet Expert (Ex Vendor & DNM Admin) | DEFCON/SANS Speaker | Youtuber | Social Engineer | Author | Paralegal
Sam Bent's avatar
SamBent 28 mins ago
#OPSEC365 010/365 Your phone logs every call you make, every text you send, and the duration of each conversation. Even with encrypted messaging, your carrier knows who you contacted, when, and for how long. Pull up your call history and imagine someone trying to map your relationships based purely on who you talk to and how often. The connections are already logged. Content can be encrypted, but metadata often can't. Who you call, when, and how often creates a pattern that reveals relationships, habits, and associations without anyone reading a single message. The structure of your communications tells its own story.
Sam Bent's avatar
SamBent 9 hours ago
Anon, Feds hate you, it's not just a meme. ๐—”๐—น๐—ถ๐—ฐ๐—ฒ ๐— ๐—ฎ๐—ฟ๐—ถ๐—ฒ ๐—๐—ผ๐—ต๐—ป๐˜€๐—ผ๐—ป | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ + ๐Ÿฎ๐Ÿฑ ๐˜†๐—ฒ๐—ฎ๐—ฟ๐˜€ Relaying phone messages in a cocaine conspiracy. First arrest ever. ๐—ช๐—ฒ๐—น๐—ฑ๐—ผ๐—ป ๐—”๐—ป๐—ด๐—ฒ๐—น๐—ผ๐˜€ | ๐Ÿฑ๐Ÿฑ ๐˜†๐—ฒ๐—ฎ๐—ฟ๐˜€ Three sales of $350 worth of marijuana with an alleged ankle holster. No prior record. ๐——๐—ถ๐—ฐ๐—ธ๐˜† ๐—๐—ผ๐—ฒ ๐—๐—ฎ๐—ฐ๐—ธ๐˜€๐—ผ๐—ป | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ Transported meth on his truck route to pay for his dying toddler's $250,000 bone marrow transplant after insurance dropped them. ๐—š๐—ฒ๐—ผ๐—ฟ๐—ด๐—ฒ ๐— ๐—ฎ๐—ฟ๐˜๐—ผ๐—ฟ๐—ฎ๐—ป๐—ผ | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ Pleaded guilty to drug charges expecting 40-54 months per the prosecution's own recommendation. The judge gave him the maximum to pressure him into snitching on the Philly mob. ๐—ง๐—ถ๐—บ๐—ผ๐˜๐—ต๐˜† ๐—ง๐˜†๐—น๐—ฒ๐—ฟ | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒMailed LSD to a Grateful Dead concert friend. Two prior nonviolent drug offenses triggered the federal three-strikes provision. ๐—™๐—ฎ๐˜๐—ฒ ๐—ช๐—ถ๐—ป๐˜€๐—น๐—ผ๐˜„ | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ Acted as a $5 middleman in a $20 crack sale to an undercover cop in Shreveport, Louisiana. ๐—–๐—ผ๐—ฟ๐˜ƒ๐—ฎ๐—ถ๐—ป ๐—–๐—ผ๐—ผ๐—ฝ๐—ฒ๐—ฟ | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ Federal marijuana conspiracy. Never touched the product, no violence. Sentenced under the federal three-strikes drug law. ๐—ฃ๐—ฎ๐˜๐—ฟ๐—ถ๐—ฐ๐—ธ ๐— ๐—ฎ๐˜๐˜๐—ต๐—ฒ๐˜„๐˜€ | ๐—Ÿ๐—ถ๐—ณ๐—ฒ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐—ฝ๐—ฎ๐—ฟ๐—ผ๐—น๐—ฒ Stole tools from a shed in Slidell, Louisiana. Enhanced by prior nonviolent convictions under habitual offender laws.
Sam Bent's avatar
SamBent 17 hours ago
SSL/TLS ecosystem analysis showing pervasive implementation failures. "We systematize knowledge about SSL/TLS and present a comprehensive analysis of its security." - ๐—ฆ๐—ผ๐—ž: ๐—ฆ๐—ฆ๐—Ÿ ๐—ฎ๐—ป๐—ฑ ๐—›๐—ง๐—ง๐—ฃ๐—ฆ: ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐˜€๐—ถ๐˜๐—ถ๐—ป๐—ด ๐—ฝ๐—ฎ๐˜€๐˜ ๐—ฐ๐—ต๐—ฎ๐—น๐—น๐—ฒ๐—ป๐—ด๐—ฒ๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ฒ๐˜ƒ๐—ฎ๐—น๐˜‚๐—ฎ๐˜๐—ถ๐—ป๐—ด ๐—ฐ๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ฒ ๐˜๐—ฟ๐˜‚๐˜€๐˜ ๐—บ๐—ผ๐—ฑ๐—ฒ๐—น ๐—ฒ๐—ป๐—ต๐—ฎ๐—ป๐—ฐ๐—ฒ๐—บ๐—ฒ๐—ป๐˜๐˜€ by Jeremy Clark and Paul C. van Oorschot (2013) https://www.ieee-security.org/TC/SP2013/papers/4977a511.pdf image
Sam Bent's avatar
SamBent yesterday
#OPSEC365 009/365 Your trash tells a story about you every week. Prescription bottles with your name and medications, bank statements with account numbers, shipping labels with your address, and receipts that show where you shop and what you buy. Anyone willing to go through your garbage can build a detailed profile without breaking any laws. Before your next trash day, look through what you're throwing out and see what you'd learn about yourself. A cross-cut shredder handles paper, but don't forget about labels on packaging and prescription bottles. Peel them off, shred them, or black them out with a marker before they go in the bin. The few seconds it takes is cheaper than the identity theft it prevents.
Sam Bent's avatar
SamBent yesterday
Medieval peasants kept more of their harvest than you keep of your paycheck. image
Sam Bent's avatar
SamBent 2 days ago
#OPSEC365 008/365 Everyone has an adversary, whether they realize it or not. It might be an ex who won't let go, a competitor digging for leverage, a scammer building a target list, or a future employer searching your name. The question isn't whether someone wants information about you, it's who and why. Write down the three most likely people or groups who might want to know more about you than you'd want them to. Your adversary determines your threat model, and your threat model determines what precautions make sense.
Sam Bent's avatar
SamBent 2 days ago
Monero devs have never once suggested building backdoors for law enforcement, Zcash's founder suggested it publicly then asked you to memory-hole his own words. image
Sam Bent's avatar
SamBent 3 days ago
#OPSEC365 007/365 Security questions aren't secure. They're public records and social media trivia. Your mother's maiden name is on genealogy sites. Your first pet's name is in a Facebook post from 2012. Your high school mascot is one Google search away. Anyone doing basic research on you can answer these questions as easily as you can. Go check what security questions protect your most important accounts and ask yourself who else could answer them. Treat security questions like additional passwords. Give false answers that only you would know, store them in a password manager, and never use real information that could be researched. Mother's maiden name can be a random phrase if you remember to save it.
Sam Bent's avatar
SamBent 4 days ago
#OPSEC365 006/365 Posting vacation photos while you're still on vacation tells everyone exactly when your home is unoccupied. The timestamp, the location tag, and the caption all confirm you're hundreds of miles away and won't be back for days. Save the photos. Post them when you're home. See if you can resist the urge to broadcast your absence in real time. If you have to post during travel, strip location data and avoid revealing details that pin down your specific location or how long you'll be gone. General photos without landmarks are harder to geolocate than a poolside shot with a resort logo visible in the background.
Sam Bent's avatar
SamBent 4 days ago
If you have to ask permission it was never a right in the first place, it was a privilege they can revoke. image
Sam Bent's avatar
SamBent 5 days ago
#OPSEC365 005/365 What's visible through your front window right now? Packages with your name on them, expensive electronics, a daily routine playing out on a predictable schedule. Anyone walking by can see it, and the ones paying attention are taking notes. Go look at your home from the outside like a stranger casing it, and see what you've been advertising. Simple fixes make a difference. Move valuables out of sightlines, vary your visible routine, and don't let delivered packages sit on the porch broadcasting that you're not home. The goal is to look like a harder target than the house next door.
Sam Bent's avatar
SamBent 5 days ago
The enemy is at the gates. Do you see where this is going? Red = Removing image
Sam Bent's avatar
SamBent 5 days ago
Chainalysis can stare at this diagram all day and still only see question marks where your identity should be. image
Sam Bent's avatar
SamBent 6 days ago
#OPSEC365 004/365 The people closest to you are your biggest OPSEC liability. Your mom posts photos of family gatherings with location tags. Your friend checks you in at bars without asking. Your ex still knows your passwords, your routines, and the answers to all your security questions. Make a mental list of the five people who could expose the most about you without even trying. You can't control what others post, but you can control what you share with them and whether you're tagged in their content. Most platforms let you review tags before they appear on your profile, and some relationships warrant a direct conversation about what's off-limits.
Sam Bent's avatar
SamBent 1 week ago
#OPSEC365 003/365 Your credit card company knows where you eat, what you buy, when you travel, and what time you usually shop. So does anyone who gets access to that data through a breach, a subpoena, or a curious employee. Log into your bank and scroll through last month's transactions like you're a stranger trying to learn about you. The patterns are obvious once you look. Cash leaves no transaction record tied to your identity. For purchases you'd rather not have logged, cash or Monero are the only options that don't create a permanent entry in a database you don't control.
Sam Bent's avatar
SamBent 1 week ago
GM sold your data to LexisNexis. Toyota shared telematics with Progressive. Allstate embedded hidden tracking in apps like Sirius XM 40 million connections tracked every 15 seconds. This is already happening. The kill switch just makes it worse.
Sam Bent's avatar
SamBent 1 week ago
Microsoft's "Fix" for Windows 11: Flowers After the Beating... Microsoft spent four years stuffing Windows 11 with ads, forced Copilot integrations, and bloatware, now they want applause for promising to remove it. image
โ†‘