Category Sector

Surveillance

Tracking, exposure, facial recognition, phone telemetry, dossiers, monitoring infrastructure, and data exhaust.

11 articles

Games We Play With Ye Olde Alfa: Why the AWUS036ACH Still Matters in 2026

The Alfa AWUS036ACH was a legend in 2017. It's a relic in 2026. But in the gap between modern Wi-Fi 7 security and the legacy equipment still running the world's infrastructure, the 'Old Blue' is still the most reliable instrument in the bag. This is why we still use it, how to keep the drivers alive on modern kernels, and what it taught us about the persistence of plaintext.

Read Article →

Defeating Facial Tracking: Red Team vs Blue Team

Major chat platform just mandated facial verification for age-restricted spaces. Here's what happened when computer vision met creative opposition. 3D printed masks. Deepfake injections. Infrared makeup. Video loop exploits. Then the blue team countermeasures. Red team adapts. Arms race continues. This is how facial recognition actually fails and how defenders try to stop it.

Read Article →

Clutch: Cellular Security Monitor

Leave your phone at home. That's the advice. It's not always safe, not always practical, and not always right. Clutch was built around a better question: what if the device told you when the cellular layer stopped behaving like background infrastructure?

Read Article →

The Pocket Spy

The phone in your pocket is not neutral hardware with a few privacy defects. It is a tracking and mediation device built inside a political and commercial arrangement that treats constant contact as normal and partial invisibility as suspicious.

Read Article →