Reports Archive:
Research & Analysis
A comprehensive collection of technical reports, security analyses, and in-depth research. Exploring the depths of digital security with a critical lens.
RSS Feed
Receive our latest reports directly in your RSS reader. No ads, no tracking.
Filter:
Sort:
Citizens Privacy Rights
9 min read
Filimo: How Iran's Leading Streaming Platform Exposes Users to Credential Theft and Cross-Border Profiling
A privacy audit of Filimo reveals plaintext credential storage, global analytics transmission, and embedded location surveillance — all operating within Iran's compelled-access jurisdiction where no independent data protection authority exists
Read Report
Citizens Privacy Rights
9 min read
Bitbaan Anti-Malware: When a Security App Becomes a Liability in Iran's Surveillance Landscape
A privacy audit of Bitbaan Anti-Malware reveals hidden camera capture, weak password encryption, network scanning, and extensive tracking — privacy failures that are particularly dangerous in an app that Iranian users trust to protect them, operating within a jurisdiction with no independent data protection oversight
Read Report
Citizens Privacy Rights
8 min read
BadeSaba Calendar: Privacy Risks of a Calendar App Operating Under Iran's Surveillance Framework
A blackbox privacy audit of BadeSaba Calendar reveals aggressive tracking and broken cryptography — vulnerabilities made far more consequential by the app's operation within a jurisdiction where the state maintains documented capabilities to compel data access without independent oversight
Read Report
Destructive Cyber Operations
17 min read
Attack Without a Hack: How a Piece of Malware Took the MahsaAlert Domain Off the Internet
Attackers created a piece of malware and registered the MahsaAlert domain as its C2 server, deceiving global security systems and causing this civil alert platform to be blocked.
Read Report
Surveillance Policy & Regulation
28 min read
How Iran’s National Information Network Works
With the internet in Iran shut down by the government of the Islamic Republic in January 2026, a familiar question resurfaced: Is the country becoming North Korea?
Read Report
Surveillance Policy & Regulation
24 min read
Policymaking and Institutional Mapping of Surveillance and Interception of Citizens under the Islamic Republic of Iran
How Centralized Authentication, Infrastructure Level Monitoring and Interception, Spyware Operations, and Street Level Surveillance Have Converged into a Unified System for Controlling, Suppressing, and Intercepting Citizens
Read Report
Technology Supply Chains
28 min read
Jamming in Iran: The Business of Disruption and the Defense Contractor Network
Examining the Role of Ofogh Saberin Co in Iranian Ministry of Defense Jamming Projects and the Export of Digital Repression Technologies
Read Report
Destructive Cyber Operations
6 min read
Charming Kitten (APT35) Modular Windows Trojan
Persistent Access and Covert Command and Control within the Islamic Republic of Iran’s Surveillance and Interception Architecture
Read Report
Destructive Cyber Operations
4 min read
RAT-2Ac2: A Report on a State-Aligned Remote Access Tool
Examining the Organizational Logic, Operational Architecture, and the Role of a Modular RAT in Charming Kitten’s Covert Digital Surveillance
Read Report
Digital Censorship & Repression
11 min read
Protection Bill 2025: The Birth of a New Extra-Legal Process for Filtering and Censorship in IRIB
Bill on Supporting and Addressing Violations in the Field of Pervasive Audio and Video in Cyberspace (Internet) in Iranian Parliament
Read Report