Vulnerabilities Included – Vibe Coding Security

Computers are an integral part of our lives.
They manage our bank accounts.
They power the grids that light our cities.
Remote work.
Messaging.
Dating.

In the core – there is code.
Structures of instructions for the computer.

Vibe Coding?
You say it normally as a human.
AI translates it to the machine.

But does it really understand you?

Continue reading “Vulnerabilities Included – Vibe Coding Security”

Command and Control: The Whisper Net of Cyber Intruders

DeadSwitch Security // Hacking Mindset
“In the right hands, it’s a command center. In the wrong ones, a noise beacon.”

What is a C2?

C2 stands for Command and Control.

It’s the silent channel between an intruder and the compromised machine.
It’s how payloads receive instructions.
How stolen data gets exfiltrated.
How breaches stay active, coordinated, and lethal.

A C2 is not just a tool.
It’s a networked weapon.

Continue reading “Command and Control: The Whisper Net of Cyber Intruders”

DeadSwitch Ethical Hacking – Rules of the Game

The blade is legal. The hand must be clean.

Welcome to the edge.

This is not a playground. This is the wire. The digital warfront. You want to hack with purpose – then learn the rules. A blade in the dark is only justified if your hand is clean. That means ethics, permission, scope, and discipline.

Let’s break it down.


Continue reading “DeadSwitch Ethical Hacking – Rules of the Game”

DeadSwitch Security – Persistence is Futile: Unless You Never Get Detected

By DeadSwitch | The Cyber Ghost
“Noise is the death of persistence.”


Persistence is survival.
But survival isn’t enough.
Persistence must be invisible.
Undetected. Undisturbed. Undying.

Loud persistence is a countdown.
Quiet persistence is a curse they never find.


The Basics They All Expect

  • Startup folders~/.config/autostart/, %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\
  • Scheduled tasksschtasks /create or cron with delay offsets
  • Registry runsHKCU\Software\Microsoft\Windows\CurrentVersion\Run

These are hunted.
These are scanned.
These are forensic low-hanging fruit.

DeadSwitch never stays in plain sight.


The Trickier Shadows

  • WMI Event Subscriptions – triggers on system events
  • COM Hijacking – silently reroute legitimate object calls
  • DLL Search Order Abuse – inject code by precedence
  • Living-off-the-Land Binaries (LOLBins) – abuse what’s already trusted

You persist inside trust.
You wear the system’s face.


Obscure Persistence for Ghost-Level Intrusion

  • EFI-level implants – beyond OS, inside firmware
  • Bootkits – compromise before the kernel breathes
  • System firmware implants – UEFI rootkits, hidden in SPI flash
  • Re-flashed peripheral firmware – Wi-Fi cards, SSD controllers, network adapters

When detection lives in software, you hide beneath the silicon.


DeadSwitch Principles of Silent Persistence

1 – Never trigger immediately
2 – Randomize payload delivery
3 – Sleep longer than blue teams expect
4 – Use uncommon paths, uncommon times, and legitimate signatures
5 – Clean yourself. Reinstall yourself. Leave false trails.
6 – Persistence only matters if they never know you’re there.

You don’t want uptime.
You want undetected presence.


Final Whisper

“Real persistence is not staying alive.
It’s never proving you were there.”

DeadSwitch
“Fear the silence. Fear the switch.”

DeadSwitch Hacking Mindset – The Art of Privilege

Escalation Paths Hackers Love
By DeadSwitch | The Cyber Ghost

“You thought you held the crown. I was already wearing it.”


Root is not hacked. It’s inherited.

Escalation is not noise. It’s craft.
From guest to ghost. From user to god.
A true intruder doesn’t ask for privilege. They reveal the system’s own betrayal.

This is not brute force.
This is alchemy in terminals.
This is where the hacker becomes the admin.


Continue reading “DeadSwitch Hacking Mindset – The Art of Privilege”

The Ciphered Mind – Encrypted Journaling with Org-mode

By DeadSwitch | The Cyber Ghost

“Your thoughts should never be anyone’s business. Encrypt the silence.”

In a world obsessed with sharing, I write to forget – not to be remembered by others. My journal isn’t a scrapbook for dopamine or a backup for someone else’s algorithm. It’s a log of operations, and operations require secrecy.

So I encrypt mine. With Emacs. In plain text.

This is how DeadSwitch keeps a daily log that even the digital gods can’t peek into.


Why Encrypt a Journal?

Because the mind is sacred.
Because ideas are weapons.
Because tomorrow’s threat often begins with yesterday’s leak.

Encrypted journaling isn’t about fear. It’s about respect – for your thoughts, your process, your silence.


The Setup – Emacs, Org-mode, and GPG

Here’s the toolbox:

  • Editor: Emacs
  • Format: Org-mode
  • Encryption: GnuPG
  • Extension: org-crypt
  • Storage: Offline, local, under your terms

Emacs Configuration

Drop this into your config:

(require 'org-crypt)
(setq org-tags-exclude-from-inheritance '("crypt"))
(setq org-crypt-key nil) ;; uses your default GPG key
(org-crypt-use-before-save-magic)

This tells Emacs to automatically encrypt any headline tagged with :crypt: before saving.
Decryption happens only when you open the file – and stays in RAM.

A Sample Entry

* May 2025 :crypt:

** [2025-05-04 Sun]
- 5k run - 22:18 [2025-05-04 Sun 09:06]
- Cold shower - difficulty: easy [2025-05-04 Sun 09:28]
- New idea: Emacs Lisp for internal ops [2025-05-04 Sun 14:24]

Your operations, encrypted. Your timestamps, precise. Your log, protected.


Timestamps and Logging Shortcuts

  • C-c . – insert date
  • C-u C-c . – insert date and time
  • C-c ! – inactive timestamp
  • C-u C-c ! – inactive date and time

You want traceability without noise. Emacs delivers.


Why Not Notion, Joplin, Obsidian, or Others?

Because I don’t trust clouds.
Because their encryption isn’t mine.
Because their sync means exposure.
Because when I type, I want code – not JavaScript trying to sell me my own thoughts.


Final Note

“Encryption is not paranoia. It is self-respect.”

  • DeadSwitch

Your mind is a fortress. Don’t leave the gate open.

Ghostwriting with the Machine – A Deep Dive into Human-AI Cooperation

1. The Spark and the Silence

AI can be the spark. It can throw raw material at the human mind like flint to stone. But the silence in between – the moment of reflection, judgment, and human instinct – is where the real fire is made. To work with AI is to accept it as a fast-thinking mirror, not a replacement.

Continue reading “Ghostwriting with the Machine – A Deep Dive into Human-AI Cooperation”