Pinned toot

Ever since I was 7 years old, I've been interested in computers, the Internet, and more recently, cybersecurity and social engineering.

I strive to become an excellent cybersecurity engineer. I'm always eager to learn and love meeting new people with similar interests. Feel free to drop me a DM!

For more information, please check out my personal blog:

Pinned toot

Friendly reminder: is a great project to contribute your otherwise idle computing power.

You can set complex scheduling options, either by time of day, battery level, non-BOINC CPU usage, mouse and keyboard activity and so on. This way, it won't take up all your resources when you're compiling or playing videogames.

You can also configure it to only take a percentage of the CPU, a specific core count, or only allow it to run in bursts.

Contribute today!

Just set up my Tor relay

It's reachable at IP with fingerprint 8BC3BBF901101500F58FEB9DA401B6725FB78AA6. Enjoy!

If you are interested in leaving #Medium (and you should!), there's
a nice script to migrate to Jekyll

I am a Computer Science student on my last year of university. I am looking for someone friendly who wishes to help me with my final thesis:, it's a programming language.

It doesn't have to be a single person to help me, and it doesn't have to be full-time help. Suggestions are always appreciated, but it would just be great to have someone friendly to chat with who has experience with compilers and parsers.

If you don't, maybe you can boost this? Thx!

What shell do you use/prefer in your GNU/Linux system?

(Please share to spread the word. And if you want comment your answer. Thanks a lot)

I hear this all the time:

"I'm a nobody; why would anyone want to hack me?"

I've got six reasons for you:

You have money.
You have good credit.
You were randomly chosen.
You pissed off the wrong person.
Your friend or family members pissed off the wrong person.
You put yourself out there as an online entrepreneur, Twitch streamer, YouTuber, etc.

If you think no one would ever try to hack you, you need this episode.

There's going to be a live YouTube Premier of this episode at YourSecure.Life/2 at 5 PM Eastern US time.

If you're not seeing this post until after that time, don't can still watch it. Any time, anywhere. Just go to the website.

There is also an audio version (it is a podcast afterall) and a text version of the transcripts, if you're more into reading.

Anonymous email forwarding, open source with paid features, capable of using gpg. Sounds good so far

Reminder: I have developed a fully static status page. I wouldn't consider it production ready just yet, there are some cosmetic quirks that I'd like to fix soon, but it is regardless just usable for the time being

You can see it in action at

Do let me know if you'd like any changes made to it, or if you have suggestions or ideas.

this whole "the internet is intangible therefore safe" idiocy is annoying the shit out of me.

>"lol who cares what porn I watch?"
well that'd be Google, FB, NSA, CIA, MI5, et. al. pretty much anyone with a vested interest in data

>"why are they following you? what makes you so special?"
No one is special under the watchful eyes of the panopticon, so it's not just "me", everyone is equally regarded as potential threat/dissident/anomaly that must be quelled.

>"only bad people care about anonymity"
a lot of famous people boost their own posts and reply to their own posts with fake profiles. Governments do it too, so this is a very telling argument tbf... And while anonymity is not the same as pseudonymous, to pretend to be someone else is very much disingenuous, to "have no name" is *not* disingenuous whatsoever. It puts a focus on words and merit, not just "identity" (w/e that means)... Furthermore, to say that "bad people do X, therefore people that do X are bad" is just embarrassingly bad logic...

>"it's not like they can even do anything even if they are following us lmao"
These are real people who have put together a massive data collection apparatus for the world's spy agencies, and real people who act on the data. What makes FB, Google so profitable? Not advertising, that's for sure! It's their ability to *target* (which just means de-anonymize)

>"why are you so scared? what are you afraid of?"
Why are you so blind? Data collection, data leaks, data sale, data trade, search engine manipulation, content manipulation, context manipulation, government spying, corporate spying, spousal and familial spyware, IOT Panopticon, stuxnet 2.0, WWIII, "Terminator IRL"

Encryption has greatly enhanced privacy and security in the past few years. But in 2019, law enforcement officials in the US, UK, and Australia launched an all-out attack on encrypted messaging, to users鈥 detriment.

People I admire: Scatman John.

His birth name is John Paul Larkin.

Did you know he suffered from a severe stutter? Before singing, he hid behind pianos because he was afraid to talk to others.

In 1995, at age 53, he became a worlwide star with his hit "Scatman (Ski-Ba-Bop-Ba-Dop-Bop)". He passed away at age 57, merely four years after becoming incredibly famous.

馃毆 :blobcat::blobowo:
-"No kitty, there's a storm outside."

馃毆 :blobcattilt::blobnervous:
-*meowww~ ;.;*
-"It's raining hard you're gonna hate it."

馃毆 :blobmiou::blobtired:
-*mewww~ T-T*
-"Ugh FINE. Just go."

馃毆 :blobglare:

馃毆 :blobcatsurprised::blobglare:
-"Yeah. I know. It's raining."

I want more .txt websites. Human-readable text-only websites. The only allowed interaction, is scrolling.

Crossposted from Twitter 

This looks neat! A visual, browser-based frontend to GDB

Should serve as a gentle introduction to debuggers for beginners. Will check it out later tomorrow.

Show more

Le贸n Castillejos's choices:

Mastodon 馃攼

Fast, secure and up-to-date instance. provides knowledge and tools to protect your privacy against global mass surveillance.

Matrix Chat:
Support us on OpenCollective, your contributions are tax deductible!