Three Buddy Problem

From Epstein to Notepad++: Redactions, Zero-Days and Supply Chain Attacks

10 snips
Feb 8, 2026
They dig into how sloppy redactions crumble under OCR and AI, making sensitive names and attachments easy to recover. They unpack a high-profile Notepad++ supply-chain compromise and how attackers abused update flows and kernels. The conversation also covers AI-driven vulnerability discovery, a China-linked gateway-monitoring framework, and how Lockdown Mode stymied forensic access.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Infosec Work Is Deeply Dual‑Use

  • Cyber tools and research are deeply dual-use: techniques for forensics and defense enable spying, blackmail, and device compromise.
  • The hosts warned the industry must reckon with ethical boundaries because capability easily serves malicious ends.
ADVICE

Actively Enforce Community Standards

  • Enforce community standards: exclude people who commit serious harms from conferences, committees, and Slack/Signal groups.
  • Juan urged conference organizers and community leaders to actively remove harmful actors to protect members.
INSIGHT

Shared Hosting Enabled Targeted Supply‑Chain Hack

  • Notepad++'s update server on shared Hostinger hosting was compromised, enabling targeted supply‑chain delivery to select IPs.
  • The attack likely used a kernel escalation and persisted via retained credentials to redirect update traffic to malware loaders.
Get the Snipd Podcast app to discover more snips from this episode
Get the app