About Cyber Obscura
An archive of special-interest stories about cybercrime, surveillance, strange networks, artificial intelligence behaving opaquely, and the hidden systems that shape the online world. Plus a curated set of lessons drawn from what they reveal.
It is the study of deterministic systems quietly doing exactly what they were designed to do, expected to do, and sometimes not.
The stories are unusual, sometimes unsettling. To unravel them, we need clear-eyed explanations of the technology that made each one possible.
Cyber Obscura is not a true-crime shrine. It is not a how-to manual for harm or hacking. It is an archive for the otherwise inattentive: the student who flips past the worked example to find the weird footnote. My hope is that reader will recognise themselves and stay.
Take E-Juche and the Optimisation of the Surveillance Stack. A case study in engineering censorship, a dictatorship dream come true: infrastructure, the political management of the information space, elaborate filtering, device patterns, and the everyday realities of who is online, how they connect, and what they are forbidden to see.
How to read Cyber Obscura
Start with the story.
Then read the technical breakdown. This is where the article explains the security concept in plain language, with the jargon unpacked.
The point is not to grasp what happened. The point is to understand what the technology made possible.
This site is built to make the technical layer luminous, to convey ideas without simplifying them into nonsense. Subnetting, ports, routing, protocols, application programming interfaces, mobile signalling, internet governance.
Cybersecurity is not a list of tools. It demands that you think, that you learn to notice systems, that you figure it out.
The work is observation. Inspection of the technical layer beneath the drama. That is the rabbit hole. That is where the failure points live.
From the archive
Case index
Strange systems, caught doing exactly what they were built to do.
Agentic web
Scaling Paywalls
An agentic browser walks past the paywall in two seconds. The lock had always been a piece of styling.
Read the case
Verification gate
Aptitude Test
On the cryptographic underground, the gate has stopped pretending to test for humanity. It is openly charging for entry.
Read the case
Voice gateway
Phoning Iran
During the 2025 conflict and the 2026 blackout, diaspora callers reaching Iran heard a voice that was not the voice they were trying to reach.
Read the case
Embedded censorship
China's Tech Deep Seekrets
A message that does not arrive. A model that does not answer. A proxy that stops being reachable. Three layers of the same enclosure.
Read the case
Recommender drift
Unnamed
Videos with no title, no description, no language the system can file them under. For years, the algorithm found them anyway.
Read the case
Mobile signalling
Signals at Sea
In 2018, a young woman tried to leave Dubai by boat. The boat was found because someone on board had a phone.
Read the case