Skip to content
View SyntaxError6666's full-sized avatar
đź« 
value moved here
đź« 
value moved here

Block or report SyntaxError6666

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
SyntaxError6666/README.md

My Telegram:

Please note: I do not accept ordinary Telegram private messages.
To send me a private message, please use a Secret Chat.
Before sending me a private message, strictly adhere to and carry out the following steps to prevent any potential man-in-the-middle attacks:

  1. Subscribe to my channel: https://t.me/CompareFingerprints
  2. Open a Secret Chat with me.
  3. Wait for me to publish key fingerprint information (i.e., a fingerprint screenshot).
  4. Open the channel link in a private/incognito browser window while logged out to view the fingerprint information I have published (using a proxy server or VPN is recommended).
  5. Compare the fingerprint information I published with what you see in the browser and the fingerprint displayed in the Secret Chat.
  6. Under the corresponding image in the channel, leave a comment stating the fingerprint information you observed (including whether it matches, and the specific fingerprint value).

Why these steps are necessary:

  1. First, assume that both the endpoint device and its TLS connection to Telegram’s servers are secure (otherwise, an attacker could completely hijack your session, making it undefendable). In this case, the only risk lies with Telegram’s servers.
  2. Under these circumstances, the only feasible method of attack is the differential display of the fingerprint information I share.
  3. This can be detected by publishing the fingerprint information in a public channel and viewing it while logged out (preferably using a proxy server, VPN, or similar means) to identify any discrepancies.

Popular repositories Loading

  1. Arper Arper Public

    Simple utility for ARP cache poisoning and sniffing

    Python 1

  2. SyntaxError6666 SyntaxError6666 Public

    How to contact me

  3. FuckWeici FuckWeici Public

    A simple tool for bypassing Weici shit.

  4. winpython winpython Public

    Forked from winpython/winpython

    A free Python-distribution for Windows platform, including prebuilt packages for Scientific Python.

    Python