Zsubmariner's avatar
Zsubmariner
co@zsubmesh.net
npub1csmg...cakv
Not your keys, not your network.
Zsubmariner's avatar
Zsubmariner 3 weeks ago
Massive brute-force wave hits Palo Alto VPNs with 2.3M attacks (November 24, 2025). Attackers scanned for exposed GlobalProtect portals, stuffing leaked/reused creds to guess network access, risking unauthorized entry into corporate systems worldwide; full impact unknown, with surges from 600K IPs. Zsub fixes this. - No central gateways to attack: Connections self-organize P2P. - No credentials to stuff: Auth with proofs of relationships between rotating self-custodial keys. - Targeting much harder: no honeypots and no linkable metadata exposed on the wire. Actually zero trust, just like Bitcoin. Not your keys, not your network. Read the white paper. Sign up for beta.
Zsubmariner's avatar
Zsubmariner 3 weeks ago
Hackers exploit Oracle EBS zero-day and pivot through local creds to steal and leak sensitive data from manufacturers and universities (November 19, 2025). Clop exfiltrated TBs of aggregated ERP data from 10+ U.S. orgs—PII for 10K+ employees (SSNs, contacts), financial records, contracts, supply chains, manufacturing blueprints, student info—cascading supply-chain leaks to unrelated partners. Zsub fixes this. - No central credential stores to pivot through. - No aggregated data plane to cascade breach across orgs. - No shared reset flows or SSO bypasses to chain exploits. - Self-custodial HD keys and selective-disclosure auth break the kill chain at the very first link. Actually zero trust, just like Bitcoin. Not your keys, not your network. Read the white paper.