Normally impersonation is the sincerest form of flattery. In this case, not really. If you see anything purporting to me or similar, it isn’t me. Old school trolls and script kiddies are having fun with my identities….
One would think to rotate their certificates months prior to expiration. Or even the bare minimum “setting up a calendar event.”
“All extensions disabled due to expiration of intermediate signing cert”
Using NSA's Ghidra to automatically build out yara signatures for a binary's odd behaviors; I love it. Currently running it against a backdoored qbittorrent. Ghidra's server is able to automatically identify the subtle, hidden callbacks and exfiltration assembly. Then construct an efficient yara rule on the fly. Impressive. You should give it a try once you figure out how to trust running their software on your system. Not clear what is reverse engineering?