Has malware detected mitmproxy and similar tools used to intercept and analyze malicious traffic?

When trying to analyze malware, have there been cases where malware detected the use of mitmproxy and ceased operation?
If that has happened, would it be a good idea to be constantly using a proxy as a measure for deterring any malware?

Continue reading Has malware detected mitmproxy and similar tools used to intercept and analyze malicious traffic?

What metadata could be stored in the IPFS network and what could be collected by modified nodes?

I’m guessing uploading to IPFS also uploads some metadata, which gets shared as well, does this assumption hold any truth? According to this only content identifiers and node identifiers are in the public.

Does uploading a file leak any o… Continue reading What metadata could be stored in the IPFS network and what could be collected by modified nodes?

Are the positions of military/spy/government satellites publicly shown on any websites? [closed]

Me and my friend have been discussing about the ongoing Russia-Ukraine war and he started showing me how all the satellites are aligned and targeted to Ukraine by US intelligence and other government bodies (supposedly, according to that p… Continue reading Are the positions of military/spy/government satellites publicly shown on any websites? [closed]

From a forensics standpoint how much leftovers do package managers in Linux leave behind?

Let’s assume that for my question we’re using the equivalent of apt purge, which also removes configuration files. What’s left behind after apt purge and similar commands from other package managers?
I’m guessing it would be loose dependen… Continue reading From a forensics standpoint how much leftovers do package managers in Linux leave behind?