Sam Bent (@doingfedtime) 's Twitter Profile
Sam Bent

@doingfedtime

Journalist | OSINT & OPSEC Specialist | Darknet Expert (Ex Vendor & DNM Admin) | DEFCON/SANS Speaker | Youtuber | Social Engineer | Author | Paralegal

ID: 1396873023345602560

linkhttps://sambent.com calendar_today24-05-2021 16:58:57

3,3K Tweet

5,5K Followers

378 Following

Sam Bent (@doingfedtime) 's Twitter Profile Photo

Monero's stealth addresses generate unique payment addresses for each transaction. Bitcoin address reuse links all your payments together forever.

Monero's stealth addresses generate unique payment addresses for each transaction. 
Bitcoin address reuse links all your payments together forever.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

Your phone's accelerometer data reveals what you're typing through vibration patterns. Apps can read keystrokes without accessing your keyboard.

Your phone's accelerometer data reveals what you're typing through vibration patterns. 
Apps can read keystrokes without accessing your keyboard.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

Two-factor authentication via SMS can be intercepted through SIM swapping attacks. Use TOTP apps or hardware keys instead of text messages.

Two-factor authentication via SMS can be intercepted through SIM swapping attacks. 
Use TOTP apps or hardware keys instead of text messages.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

Even the local PDs are now protecting the child rapists. Virginia Beach Police Department It would be great to see these cops who let a dude who raped a 6 year old go to prison as co-conspirators.

Sam Bent (@doingfedtime) 's Twitter Profile Photo

Orbot routes Android app traffic through Tor but most apps leak data through direct connections. Use VPN kill switches or isolate apps completely.

Orbot routes Android app traffic through Tor but most apps leak data through direct connections. 
Use VPN kill switches or isolate apps completely.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

Your browser's user agent string reveals your OS, browser version, and installed plugins. Fingerprinting scripts use this to track you across sites.

Your browser's user agent string reveals your OS, browser version, and installed plugins. 
Fingerprinting scripts use this to track you across sites.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

How did privacy become a premium feature? Because surveillance became the default business model and opting out costs extra.

How did privacy become a premium feature? 
Because surveillance became the default business model and opting out costs extra.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

IRS Agent George: 'ERC-20? ETH? Never heard of her.' Also IRS Agent George: Expert witness in a crypto laundering case. 🔥 This is fine. 🔥 #TornadoCash #ClownShow

IRS Agent George: 'ERC-20? ETH? Never heard of her.'
Also IRS Agent George: Expert witness in a crypto laundering case.
🔥 This is fine. 🔥 
#TornadoCash #ClownShow
Sam Bent (@doingfedtime) 's Twitter Profile Photo

Jami creates decentralized messaging without servers or accounts. Your messages route through peer-to-peer networks like file sharing.

Jami creates decentralized messaging without servers or accounts. 
Your messages route through peer-to-peer networks like file sharing.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

Hardware wallets keep crypto keys offline but still leak transaction data to blockchain explorers. Use coin mixers before and after storage.

Hardware wallets keep crypto keys offline but still leak transaction data to blockchain explorers. 
Use coin mixers before and after storage.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

Every file on your hard drive has a unique acoustic signature. Different physical locations = different mechanical sounds. Attackers can determine EXACTLY what files you're accessing just by listening to the clicks and whirls. Terrifying truth: youtu.be/kDMfDN7iuQY

Sam Bent (@doingfedtime) 's Twitter Profile Photo

Your ISP throttles VPN traffic during peak hours to discourage encrypted connections. They want to inspect and monetize your browsing data.

Your ISP throttles VPN traffic during peak hours to discourage encrypted connections. 
They want to inspect and monetize your browsing data.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

Whonix runs two virtual machines one for Tor gateway, one for applications. Even malware can't discover your real IP address.

Whonix runs two virtual machines one for Tor gateway, one for applications. 
Even malware can't discover your real IP address.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

Location services work even with GPS disabled through WiFi and Bluetooth beacons. Turn off these radios completely for real location privacy.

Location services work even with GPS disabled through WiFi and Bluetooth beacons. 
Turn off these radios completely for real location privacy.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

youtu.be/TRnOVyh5hl4 They're coming for you... 2025: Metadata dragnet begins 2026: Backdoor mandates drop / State crypto-monopoly 2027: 27-state surveillance mesh / Privacy coins killed 2028: AI mass surveillance deployed 2030: Total cryptographic defeat

youtu.be/TRnOVyh5hl4
They're coming for you...
2025: Metadata dragnet begins
2026: Backdoor mandates drop / State crypto-monopoly
2027: 27-state surveillance mesh / Privacy coins killed
2028: AI mass surveillance deployed
2030: Total cryptographic defeat
Sam Bent (@doingfedtime) 's Twitter Profile Photo

Privacy Was Normal Until 50 Years Ago For all human history, financial privacy was the default. Now they imprison anyone who restores it. youtu.be/WN5uOMTGzPc #FinancialPrivacy #BankSecrecyAct #TornadoCash

Sam Bent (@doingfedtime) 's Twitter Profile Photo

SimpleX Chat uses temporary anonymous identities for each conversation. No phone numbers, usernames, or permanent identifiers required.

SimpleX Chat uses temporary anonymous identities for each conversation. 
No phone numbers, usernames, or permanent identifiers required.
Sam Bent (@doingfedtime) 's Twitter Profile Photo

Your printer adds invisible yellow dots to every page that encode serial numbers and timestamps. These 'Machine Identification Codes' track documents.

Your printer adds invisible yellow dots to every page that encode serial numbers and timestamps. 
These 'Machine Identification Codes' track documents.