Event JSON
{
"id": "52ad775d307ee7ff3baa14eca2ce716927d97dab391ec013b84a81fd129498d8",
"pubkey": "662250ce4d037de109a64a6a0230f7899f922b76346388b3e7ca06fe9490358d",
"created_at": 1742994632,
"kind": 1,
"tags": [
[
"imeta",
"url https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/228/890/918/778/555/original/fd273063b7e04396.png",
"m image/png"
],
[
"proxy",
"https://infosec.exchange/@briankrebs/114228896202841822",
"web"
],
[
"proxy",
"https://infosec.exchange/users/briankrebs/statuses/114228896202841822",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/briankrebs/statuses/114228896202841822",
"pink.momostr"
],
[
"-"
]
],
"content": "The Electronic Frontier Foundation has released an open source project called Rayhunter. It is designed to run on an inexpensive (~$20) mobile hotspot and look for signs of mobile spying devices called cell-site simulators. Also known as Stingrays or IMSI catchers, they masquerade as legitimate cellphone towers, tricking phones w/in a certain radius into connecting to the device rather than a tower.\n\n https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/114/228/890/918/778/555/original/fd273063b7e04396.png\n",
"sig": "04adb842d648cda9920b7a00de9c0e0c053da6e0b8d451bb0da5241b601066824a9bf49396380d1e209d363c8f8bbbd13c2c4c3dad46310cb1fa17551011b5c8"
}