Chat with Neo


by Kenny Wolf

Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds.

Chat with Neo

With Matrix you can chat securely and decentralised with your friends and Neo. With Matrix this is possible. There you can also chat about what caught my eye this week (see below), like Bitwarden's "Zero knowledge" promise which failed.

Heading in to the Matrix

Matrix is an open network for secure, decentralised communication. But what's different from Signal, WhatsApp an Co.?

Matrix itself is an open source protocol, where different clients can use it to communicate with each other. Like with email, I can send you an email from an outlook account to a gmail account. But I can't send you a message from Signal to WhatsApp. Matrix make this (to some degree) possible.


What caught my eye this week

Integrity of Password Manager

Intelligent researchers at ETH Zürich discovered some no-nos on password managers like Bitwarden, Dashlane, and LastPass.

How to Build a Dark Web Monitor

Why you ask? Because it's fun! And it has some scientific aspect to it. Read the article on Medium.

New Worm in Town

With the announcement of Dune Part III, there is also a new self-replicating worm which infects various GitHub and npm repositories.


Tip of the Week

Do you want to learn how to do forensics on Linux machines? Or do you want to brush up your skills in Linux forensics? Then I can highly recommend reading the book "Practical Linux Forensics" by Bruce Nikkel.

It gives a really great overview and deep dive into various topics about Linux forensics like evidence from storage devices and filesystems, Linux logs, and reconstructing system boot and initialisation.

You can find the book on NoStarchPress (no referral, just a fanboy).


Forward this to a friend who cares about online security.

Read more stories on the Clear Byte blog

Clear Byte

by Kenny Wolf

600 1st Ave, Ste 330 PMB 92768, Seattle, WA 98104-2246
Unsubscribe · Preferences

Clear Byte

Clear Byte decodes the hidden layers of hacking, forensics, and digital systems—delivering academic clarity in byte-sized, actionable insights for tech-curious minds.

Read more from Clear Byte

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. Forensic methods, counterattacks and crazy AI Photo by Immo Wegmann on Unsplash In this issue we talk about forensics methods for extracting a forensic image, AI agents going crazy, and some wins for the good guys. Europol and Interpol both got a huge win in two different operations arresting over 100 people...

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. Age Verification on Social Media Platforms Photo by Zulfugar Karimov on Unsplash Discord adds a new honeypot for attackers with age verification on their platform. This leads to discussions, since we know that age verification checks are either not privacy friendly or can be circumvented easily. Then we have...

by Kenny Wolf Clear Byte decodes the hidden layers of hacking, privacy, and digital systems — delivering academic clarity in byte-sized, actionable insights for tech-curious minds. AI disappoints CEO hopes so far Photo by Nahrizul Kadri on Unsplash AI is not delivering the promised results, and companies are becoming disillusioned with the large investments they have made. On the other hand, we now know that even the FBI cannot crack Apple's lockdown mode. More details on this in this...