Something to try with old routers just sitting on a shelf, or in a box. https://www.gadgetreview.com/how-to-setup-a-router-as-a-bridge
Thursday, April 9, 2026
How to Connect Two Routers (with Pictures) - wikiHow
Something to try with old routers just sitting on a shelf, or in a box. Perhaps create a separate LAN for la use or testing. https://www.wikihow.com/Connect-Two-Routers
How to Make a Wireless Bridge with Two Routers
Something to try with old routers just sitting on a shelf, or in a box. https://www.digitalcitizen.life/how-to-make-a-wireless-bridge-with-two-routers/
Fiber optic cables as a Security Threat
Fiber optic cables running through your walls can be turned into hidden microphones that record every word spoken in the room. This is not a theory anymore. Researchers from Hong Kong Polytechnic University published a fully working attack at the NDSS Symposium in February 2026, and the results are going to change the way a lot of people think about what is running through their walls.
I refused to get fiber optic internet installed at my house. Call it a security instinct. Everyone around me thought I was being paranoid. Turns out that feeling was right.
A fiber optic cable is a thin strand of glass that carries data as pulses of light, and for decades, that made fiber the secure choice. Copper wire leaks electrical signals out of the cable in all directions, and those signals can be picked up from the outside without ever touching the wire. Fiber carries light, not electricity, so there is nothing leaking out, nothing to pick up, no signal escaping the glass. That assumption held for a long time.
It no longer holds.
When sound moves through a room and reaches a glass fiber, it causes tiny physical bends in the cable. The sound pushes against the glass, barely, almost too small to measure, but enough. Those tiny bends slightly change how the laser light travels through the fiber, and that change carries information. That information can be turned back into audio.
The technology that does this is called Distributed Acoustic Sensing, or DAS. DAS was originally built for things like pipeline monitoring, border security, and earthquake research. It works by firing laser pulses down a fiber and reading the light that bounces back. Think of it like radar, but for vibrations along the entire length of the cable at the same time. Any change in that returning light reveals exactly what is happening at that point along the cable, accurate down to the centimeter. Connect a commercial DAS unit to the far end of a home fiber connection and the cable inside the building becomes the microphone.
The problem is that a standard fiber cable running straight along a wall does not pick up voices very well. Footsteps travel through the floor and the cable catches those just fine, but speech moves through air and by the time that pressure reaches the glass it is too weak to read clearly. The researchers solved this with something they call a sensory receptor.
Fifteen meters of standard fiber cable, wound tightly around a hollow plastic cylinder, 65mm wide, made from the same material as a regular plastic water bottle. That coiled cylinder catches incoming sound and turns it into a stretching and pulling force along the entire length of wound fiber at once, which is a clever physics trick: instead of one tiny spot on the cable bending slightly, the whole coil responds at the same time, which makes the signal strong enough to read. Place that cylinder inside the standard plastic wall box that sits on the wall after every home fiber installation, and from the outside it looks completely normal. From the inside, it is a listening device.
In real office testing at 2 meters from a conversation, the system picked up over 80% of what was said. At 1 meter, fewer than 10 words out of every 100 were missed. The AI tools used to turn the audio into text, Nvidia's Parakeet and OpenAI's Whisper, had no trouble with the rest. The person running this attack can be 50 meters away, in a different room or outside the building, with no view of the target space at all.
To understand how wide the attack surface actually is: there are over 500 million active fiber-to-the-home connections worldwide right now. China alone accounts for more than 60% of that. Twenty-one countries have already crossed 50% household penetration, with the UAE sitting at 99.5%, South Korea at 96.6%, and Singapore at 87.5%. This is not a niche installation in a handful of cities. Half the world already has this cable in the walls.
Now here is what none of the other coverage on this research is mentioning.
Most fiber installations do not pull a single cable into a building. Several are laid at once, because once the walls are open and the conduits are in place it makes sense to run a few extra while the work is being done. One cable goes active, the rest stay unused inside the walls, ceilings, and cable runs throughout the building. These are called dark fibers, and they belong to no active service, are checked by nobody, and run right through the rooms where private conversations happen every day. Someone with access to the fiber cabinet on the street, the one that feeds the whole building, does not need to touch the active internet connection at all. Those dark fibers are already sitting in the walls, completely unguarded.
People who take privacy seriously sometimes buy ultrasonic jammers to block hidden microphones. These work by filling the room with high-pitched sound that scrambles the electronics inside a standard microphone and makes recording impossible. Against this attack, they do absolutely nothing. The sensory receptor has no electronics in it at all, nothing to scramble, nothing to overload, nothing that responds to ultrasound in any way. The researchers tested this directly and found zero effect on the quality of what was captured even with a jammer sitting right next to the receptor.
Professional bug sweeps, the scans that security companies run through boardrooms and government offices to find hidden listening devices, also miss this completely. Those sweeps look for radio signals that a hidden device sends out. Glass fiber carrying light sends out nothing, and a sensory receptor sitting inside a standard wall box leaves no electronic trace of any kind. No wireless signal, no power draw, no radio frequency of any kind. It is plastic and glass, on a wall, looking exactly like every other fiber box in the building.
And it is not only listening. With three receptors placed around a room, the system can figure out exactly where in the room the sound is coming from, with an average error of only 77 centimeters. It tracks movement. It can also recognize what is happening in the room just from the fiber signal alone, footsteps, someone typing on a keyboard, a washing machine running, all of it, without a microphone anywhere in the picture.
The best setup in the study had the fiber wall box attached to the underside of a desk. When the box sits against the desk surface, the vibrations from the tabletop travel straight into the fiber through solid material instead of through air, which cuts out most of the signal loss. In that setup the system got fewer than 9 words wrong out of every 100, which is cleaner than most phone calls.
The real limitation of this attack is that it needs someone to physically get to the fiber box inside the building to install the receptor, and someone to get to the street cabinet that feeds the building. That is not something that can be done remotely. But every fiber installation in the world involves a technician going inside and opening that box. So does every service visit, every upgrade, every reported fault. The researchers point to corrupt ISP employees, subcontractors, and people pretending to be telecom technicians as the realistic ways this access gets obtained, and they reference documented cases of all three.
The DAS equipment costs several thousand to tens of thousands of dollars, which puts this firmly in the territory of government operations and serious corporate espionage, not everyday crime. Law firms with sensitive cases, executive offices, research companies with valuable technology, diplomatic buildings. Exactly the places that already pay for professional security sweeps, and exactly the places those sweeps will not catch this.
Tapping fiber at the big infrastructure level is not new. Operation Ivy Bells in 1971 was a joint US Navy, CIA, and NSA mission that used divers to attach a recording device to a Soviet underwater military communications cable. The NSA program RAMPART-A, running since 1992, tapped fiber traffic at the major network hubs where international cables converge. The USS Jimmy Carter, a nuclear submarine, was reportedly built with a special 100-foot hull extension specifically to support non-invasive taps on undersea fiber cables. The Snowden documents showed that GCHQ was pulling data from the undersea fiber cable landing points in the UK and sharing it with the NSA.
What this 2026 research changes is the distance. The attack moved from the backbone of the global internet to the last 10 meters inside a building.
Here is what actually reduces the risk.
→ Do not leave excess fiber coiled up inside the wall box. Installers often do this to keep things tidy, but every extra loop is more cable that can pick up sound. Ask that any leftover length gets routed back outside the room instead.
→ Keep fiber cables running flat and straight through rooms where privacy matters. A cable looped around anything, a cable tie, a hook, a piece of furniture, picks up sound much better than a straight run does.
→ Put sound-absorbing material on walls in rooms where sensitive conversations happen. Sound that never reaches the cable cannot be picked up from it.
→ For high-security spaces, look into optical isolators on the fiber line. These are simple passive components that only let light travel one way through the cable, which stops the returning light signal that DAS needs from getting back to the attacker's equipment.
→ The physical box on the wall matters. Lock it, keep a record of what is inside it, and watch anyone who opens it.
→ Check who has access to the fiber cabinet that serves the building. If that cabinet is not properly secured, the risk exists no matter what is done inside the walls.
The paper is titled "Hiding an Ear in Plain Sight" and was presented at NDSS 2026 by researchers from Hong Kong Polytechnic University and the Chinese University of Hong Kong.
The social engineering angle that makes this attack possible, understanding how attackers get physical access by impersonating legitimate technicians, is exactly the kind of thinking covered in my ethical hacking course.
(The link supports me directly as your instructor!)
Hacking is not a hobby but a way of life.
Research & writing: Jolanda de Koff | HackingPassion.com
Sharing is fine. Copying without credit is not.
Read the full breakdown:
Wednesday, April 8, 2026
How to Import Photos and Videos from an iPhone to Linux
Viewing and transferring photos to Linux Mint PC - I can't see the DCIM folder containing photos (Apr 2023) ...
https://discussions.apple.com/thread/254759836?sortBy=rank
"To view and transfer photos from an iPhone to a Linux Mint PC, you may follow these steps:
Connect your iPhone to your Linux Mint PC using a USB cable.
On your iPhone, you will be prompted to "Trust This Computer". Tap "Trust" and enter your iPhone passcode if prompted.
On your Linux Mint PC, open the file manager by clicking on the "Files" icon on the taskbar.
In the file manager, you should see your iPhone listed under "Devices". Click on your iPhone to open it.
You will see a folder called "DCIM" (Digital Camera Images). This folder contains all the photos and videos on your iPhone.
Select the photos you want to transfer by holding down the "Ctrl" key and clicking on each photo.
Drag and drop the selected photos from the "DCIM" folder to the folder on your Linux Mint PC where you want to save the photos.
Wait for the transfer to complete. Once it's done, you can unplug your iPhone from your Linux Mint PC.
How to Import Photos and Videos from an iPhone to Linux (and Convert HEIC to JPEG) - July 2025:
https://itstorage.net/index.php/ldce/guie/623-how-to-import-photos-and-videos-from-an-iphone-to-linux-and-convert-heic-to-jpeg
Detailed instructions - print if needed ...
Linux Mint - iPhone photos: https://forums.linuxmint.com/viewtopic.php?t=429318
"After searching the forum, I tried finding info about libimobile, but all of the posts are ancient, so I wonder if better solutions have come to be."
"ibimobile is installed by default and it enables access to your iphone."
"If you're looking to do some simple organizing and editing, Shotwell should do the job. It can open HEIC files, which are iPhone photos."
"I was successful with the Shotwell program after I restarted my iPhone and then re-established the USB connection."
"... when I can't get Shotwell to access my iPhone because "the camera is locked by another application" the application which is actually blocking Shotwell's access is usually Nemo, the file manager application. Close all the Nemo windows and Shotwell will now be able to get to you iPhone photos ..."
"I plug my usb cable into my iphone and computer and get "USB Accessory. Unlock iphone to use accessories" on the iphone. So I unlock the iphone and then two icon folders appear on the computer desktop. I ignore the "Documents on My iphone" icon and use the "iPhone" icon, which double-clicking opens showing a DCIM folder. My photos are In that, sorted into monthly folders."
How to Use iPhone with Linux (Complete Guide - Dec 2025):
https://geekchamp.com/how-to-use-iphone-with-linux-complete-guide/
"Key steps include installing specialized tools like libimobiledevice, which facilitates communication with iOS devices without relying on proprietary software.
Additionally, managing media files through applications like Amarok or Rhythmbox, and utilizing file transfer protocols such as MTP or SSH, can streamline your interaction with your iPhone."
"One of the primary challenges is that iPhones use proprietary protocols and file formats, which Linux does not natively support."
"... libimobiledevice is a popular library that enables Linux users to communicate with iOS devices. It supports features like device information retrieval, photo transfer, and even some aspects of data synchronization.
Additionally, ifuse allows mounting the iPhone’s filesystem, making it easier to access media files directly."
"Several tools are essential for managing an iPhone on Linux:
"Configure udev Rules
"To allow non-root access to your iPhone, set up udev rules:
Create a new rules file: sudo nano /etc/udev/rules.d/90-ios.rules
Add the following line:
ATTR{idVendor}=="05ac", MODE="0666", GROUP="plugdev"
This grants appropriate permissions for your iPhone when plugged in."
"After configuration, restart your udev service:
sudo udevadm control --reload-rules && sudo service udev restart
Verify that your system recognizes the iPhone with:
ideviceinfo
If you see device details, your Linux environment is ready for iPhone management."
"Method 1: Using USB with libimobiledevice -
To get started:
Install the library via your package manager. For Debian-based systems, run
sudo apt install libimobiledevice6 libimobiledevice-utils.
Connect your iPhone via USB.
Verify device recognition by executing idevice_id -l. Your device should be listed.
Use tools like ifuse to mount the iPhone filesystem, enabling file transfers."
"Method 2: Using GNOME Photos and Files -
Connect your iPhone via USB and unlock it.
If prompted, tap Trust on the iPhone.
Open GNOME Photos or your preferred file manager. The device should appear under devices or media.
Copy photos and videos directly to your Linux system."
"Method 3: Wireless Transfer via Airdrop Alternatives
While AirDrop is exclusive to Apple devices, you can use third-party apps like Snapdrop or Feem to transfer files wirelessly between your iPhone and Linux:
"Using File Transfer Apps
iTunes Alternatives: Since iTunes is unavailable on Linux, consider using tools like libimobiledevice or ifuse.
libimobiledevice: This open-source library allows Linux systems to communicate with iOS devices. Install it via your terminal:
sudo apt-get install libimobiledevice ifuse
Mount iPhone Filesystem: Connect your iPhone via USB and run:
idevicepair pair
mkdir ~/iPhone
ifuse ~/iPhone
This mounts your iPhone’s storage, enabling file transfers within the mounted directory.
File Management: Drag and drop files directly within the mounted folder. When finished, unmount with:
fusermount -u ~/iPhone"
"SSH over Wi-Fi: For advanced users, set up an SSH server on iPhone (using apps like OpenSSH) and connect from Linux via SSH, enabling file transfers through command-line tools like scp."
"Choose a Backup Tool
libimobiledevice: An open-source library that enables communication with iOS devices. It can create and manage backups.
Use your distribution’s package manager. For example, on Ubuntu, run:
sudo apt update
"Connecting and Backing Up Your iPhone
"Backups stored on your Linux system can be managed manually. To restore, use:
idevicebackup2 restore /path/to/backup "
...
What's the easiest way to transfer files from iPhone to Linux desktop?
https://www.reddit.com/r/linuxquestions/comments/16o4ubn/whats_the_easiest_way_to_transfer_files_from/
"I'm using manjaro. Mostly interested in syncing photos and videos."
"KDE Connect app--you need to install it on the Manjaro PC and also as an app on the iPhone."
" I bet the hardest way is iFuse, but holy heck is it fast compared to MTP like on Android.
iFuse has to be started on the command line, but then you can use a file manager to move stuff on and off. "
"On Mint, I just plug iPhone in and it’s there. I transfer via Nemo the native Cinnamon file manager. Pix I think asks to import as well, but I prefer Nemo. "
"Or run a Nextcloud instance on your Linux box and get the Nextcloud app for you iPhone."
"It will sync your entire photo library automatically, with options to configure format, naming and sub directories.
It takes configuration, but with a dynamic DNS and open ports (and always on pc) you can have your own cloud data on your own drive anywhere you have internet access, with the only limit for space being the size of the drive your Nextcloud data folder lives on."
https://discussions.apple.com/thread/254759836?sortBy=rank
"To view and transfer photos from an iPhone to a Linux Mint PC, you may follow these steps:
Connect your iPhone to your Linux Mint PC using a USB cable.
On your iPhone, you will be prompted to "Trust This Computer". Tap "Trust" and enter your iPhone passcode if prompted.
On your Linux Mint PC, open the file manager by clicking on the "Files" icon on the taskbar.
In the file manager, you should see your iPhone listed under "Devices". Click on your iPhone to open it.
You will see a folder called "DCIM" (Digital Camera Images). This folder contains all the photos and videos on your iPhone.
Select the photos you want to transfer by holding down the "Ctrl" key and clicking on each photo.
Drag and drop the selected photos from the "DCIM" folder to the folder on your Linux Mint PC where you want to save the photos.
Wait for the transfer to complete. Once it's done, you can unplug your iPhone from your Linux Mint PC.
NOTE: If you're having trouble accessing your iPhone on Linux Mint, you may need to install the "libimobiledevice" package on the PC using the terminal. To do this, open the terminal and type
"sudo apt-get install libimobiledevice". Then try connecting your iPhone again."
How to Import Photos and Videos from an iPhone to Linux (and Convert HEIC to JPEG) - July 2025:
https://itstorage.net/index.php/ldce/guie/623-how-to-import-photos-and-videos-from-an-iphone-to-linux-and-convert-heic-to-jpeg
Detailed instructions - print if needed ...
Linux Mint - iPhone photos: https://forums.linuxmint.com/viewtopic.php?t=429318
"After searching the forum, I tried finding info about libimobile, but all of the posts are ancient, so I wonder if better solutions have come to be."
"ibimobile is installed by default and it enables access to your iphone."
"If you're looking to do some simple organizing and editing, Shotwell should do the job. It can open HEIC files, which are iPhone photos."
"I was successful with the Shotwell program after I restarted my iPhone and then re-established the USB connection."
"... when I can't get Shotwell to access my iPhone because "the camera is locked by another application" the application which is actually blocking Shotwell's access is usually Nemo, the file manager application. Close all the Nemo windows and Shotwell will now be able to get to you iPhone photos ..."
"I plug my usb cable into my iphone and computer and get "USB Accessory. Unlock iphone to use accessories" on the iphone. So I unlock the iphone and then two icon folders appear on the computer desktop. I ignore the "Documents on My iphone" icon and use the "iPhone" icon, which double-clicking opens showing a DCIM folder. My photos are In that, sorted into monthly folders."
How to Use iPhone with Linux (Complete Guide - Dec 2025):
https://geekchamp.com/how-to-use-iphone-with-linux-complete-guide/
"Key steps include installing specialized tools like libimobiledevice, which facilitates communication with iOS devices without relying on proprietary software.
Additionally, managing media files through applications like Amarok or Rhythmbox, and utilizing file transfer protocols such as MTP or SSH, can streamline your interaction with your iPhone."
"One of the primary challenges is that iPhones use proprietary protocols and file formats, which Linux does not natively support."
"... libimobiledevice is a popular library that enables Linux users to communicate with iOS devices. It supports features like device information retrieval, photo transfer, and even some aspects of data synchronization.
Additionally, ifuse allows mounting the iPhone’s filesystem, making it easier to access media files directly."
"Several tools are essential for managing an iPhone on Linux:
- libimobiledevice: Enables communication with iOS devices without needing iTunes.
- ifuse: Mounts the iPhone’s filesystem to access files directly.
- usbmuxd: Facilitates multiplexing connections to iOS devices over USB.
Install these packages with the following command:
sudo apt install libimobiledevice6 ifuse usbmuxd "
"To allow non-root access to your iPhone, set up udev rules:
Create a new rules file: sudo nano /etc/udev/rules.d/90-ios.rules
Add the following line:
ATTR{idVendor}=="05ac", MODE="0666", GROUP="plugdev"
This grants appropriate permissions for your iPhone when plugged in."
"After configuration, restart your udev service:
sudo udevadm control --reload-rules && sudo service udev restart
Verify that your system recognizes the iPhone with:
ideviceinfo
If you see device details, your Linux environment is ready for iPhone management."
"Method 1: Using USB with libimobiledevice -
To get started:
Install the library via your package manager. For Debian-based systems, run
sudo apt install libimobiledevice6 libimobiledevice-utils.
Connect your iPhone via USB.
Verify device recognition by executing idevice_id -l. Your device should be listed.
Use tools like ifuse to mount the iPhone filesystem, enabling file transfers."
"Method 2: Using GNOME Photos and Files -
Connect your iPhone via USB and unlock it.
If prompted, tap Trust on the iPhone.
Open GNOME Photos or your preferred file manager. The device should appear under devices or media.
Copy photos and videos directly to your Linux system."
"Method 3: Wireless Transfer via Airdrop Alternatives
While AirDrop is exclusive to Apple devices, you can use third-party apps like Snapdrop or Feem to transfer files wirelessly between your iPhone and Linux:
- Install the app on both devices or open the web interface.
- Ensure both devices are on the same Wi-Fi network.
- Select files to share through the app’s interface."
"Using File Transfer Apps
iTunes Alternatives: Since iTunes is unavailable on Linux, consider using tools like libimobiledevice or ifuse.
libimobiledevice: This open-source library allows Linux systems to communicate with iOS devices. Install it via your terminal:
sudo apt-get install libimobiledevice ifuse
Mount iPhone Filesystem: Connect your iPhone via USB and run:
idevicepair pair
mkdir ~/iPhone
ifuse ~/iPhone
This mounts your iPhone’s storage, enabling file transfers within the mounted directory.
File Management: Drag and drop files directly within the mounted folder. When finished, unmount with:
fusermount -u ~/iPhone"
"SSH over Wi-Fi: For advanced users, set up an SSH server on iPhone (using apps like OpenSSH) and connect from Linux via SSH, enabling file transfers through command-line tools like scp."
"Choose a Backup Tool
libimobiledevice: An open-source library that enables communication with iOS devices. It can create and manage backups.
idevicebackup2: Part of libimobiledevice, it allows backups similar to iTunes.
"Installing libimobiledeviceUse your distribution’s package manager. For example, on Ubuntu, run:
sudo apt update
sudo apt install libimobiledevice ifuse usbmuxd "
iTunes alternatives: Tools like CopyTrans and iMazing are not Linux-native but can be run via Wine or virtual machines for more advanced backup management."
- Connect your iPhone via USB.
- Verify device recognition using the command: idevice_id -l.
- Create a backup with: idevicebackup2 backup /path/to/backup - Replace /path/to/backup with your preferred directory.
"Backups stored on your Linux system can be managed manually. To restore, use:
idevicebackup2 restore /path/to/backup "
...
What's the easiest way to transfer files from iPhone to Linux desktop?
https://www.reddit.com/r/linuxquestions/comments/16o4ubn/whats_the_easiest_way_to_transfer_files_from/
"I'm using manjaro. Mostly interested in syncing photos and videos."
"KDE Connect app--you need to install it on the Manjaro PC and also as an app on the iPhone."
" I bet the hardest way is iFuse, but holy heck is it fast compared to MTP like on Android.
iFuse has to be started on the command line, but then you can use a file manager to move stuff on and off. "
"On Mint, I just plug iPhone in and it’s there. I transfer via Nemo the native Cinnamon file manager. Pix I think asks to import as well, but I prefer Nemo. "
"Or run a Nextcloud instance on your Linux box and get the Nextcloud app for you iPhone."
"It will sync your entire photo library automatically, with options to configure format, naming and sub directories.
It takes configuration, but with a dynamic DNS and open ports (and always on pc) you can have your own cloud data on your own drive anywhere you have internet access, with the only limit for space being the size of the drive your Nextcloud data folder lives on."
Monday, April 6, 2026
Ruger LCP MAX: A subcompact pistol with 10+1 rounds of .380 ACP
https://athlonoutdoors.com/article/ruger-lcp-max-pistol/ - Ruger LCP MAX
https://ruger.com/products/lcpMax/models.html - Ruger LCP MAX
https://athlonoutdoors.com/article/ruger-lcp-pistol-review/ - the original LCP
"Chambered in .380 Auto, the Ruger® LCP® MAX fits 10+1 rounds into the same footprint as the LCP® II."
"The LCP MAX isn’t just a new version with a tweak here and an adjustment there. It’s almost an entirely new pistol. First, Ruger decided to borrow from the micro-capacity playbook and increase the LCP MAX’s magazine capacity from the LCP II’s six rounds to 10 rounds. To accomplish this, the height of the LCP MAX has been increased .41 inches more than the LCP II’s height, and the width has been increased slightly from .75 inches to .93 inches. Even so, the LCP MAX is still smaller—and significantly lighter—than any micro-compact 9mm pistol on the market."
"Another big change is the addition of extremely nice, honest-to-goodness sights. Where the LCP II had tiny, rather perfunctory, sights, the LCP MAX comes with a U-notch, serrated rear sight and a tritium front sight with a white outline for easy visibility."
The Beretta 20X Bobcat - an 8 round 22 LR subcompact pistol that's suppressor ready
Also check out the similar Tomcat in 32 ACP.
"The Beretta 20X Bobcat is an evolution of the .22LR 21A. It, in turn, evolved from the original Model 20 released in the late 1960s."
"The 20X shares most of the features of the 21A. It’s still an ultra-compact .22 LR blowback pistol with an exposed hammer and double/single-action trigger. Beyond that, it improves upon the 21A in almost every way. It’s built on an aluminum frame that now has an integral trigger guard. Beretta has improved both the strength and ergonomics of the 20X."
Subscribe to:
Comments (Atom)