B
borisych
New Member
- Joined
- November 21, 2025
- Messages
- 1
- Reaction score
- 0
- Points
- 0
- Thread Author
- #1
If you want to exchange the raw traces of the TZ-DRAM (I have complete dumps of Exynos 2100/2200 and T8101) or review an S-EL1 loader that opens any Trustlet app live, use Briar://adit5oll6cwqsy52a2caka2fjmy2qkrcyouy2fqr4pjdxjrzritxa
(Briar available on PlayStore and F-Droid).
Furthermore, I am looking for a squad of extremely experienced hackers, or those with intermediate-advanced programming knowledge, so that I can train them. If you are a federal agent, please note that I use a Raspberry Pi 4 8 GB + encrypted external SSD (LUKS).
Raspberry Pi OS Lite + kernel compiled with grsecurity, without proprietary firmwares and QubeOS. And Tor-only (torrc blocks UDP outbound, DNS via isolated SOCKS5). Briar will only be used for initial communication; eventually, we would use sparse multi-hop mesh networks or another more anonymous means of communication.
(Briar available on PlayStore and F-Droid).
Furthermore, I am looking for a squad of extremely experienced hackers, or those with intermediate-advanced programming knowledge, so that I can train them. If you are a federal agent, please note that I use a Raspberry Pi 4 8 GB + encrypted external SSD (LUKS).
Raspberry Pi OS Lite + kernel compiled with grsecurity, without proprietary firmwares and QubeOS. And Tor-only (torrc blocks UDP outbound, DNS via isolated SOCKS5). Briar will only be used for initial communication; eventually, we would use sparse multi-hop mesh networks or another more anonymous means of communication.