Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Security
Matt Stephens
Matt_S_Stephens
Women detect weakness in a man like it's a 6th sense.If you:-show neediness-compromise your values-get butt-hurt-lose your cool-don't stick up for her when you should-become dependent on her-fail to take
Read more
Lacey
koronkowy
Hey! I'd like to follow / check out your digital content and videos of talks at #infosec events. Many are going digital this year, so I bet there's a lot
Read more
Will Butler
willbtlr
how to find vulnerabilities in code:- search for dangerous functionality- find a path from input you control to that dangerous functionality- test your exploit by isolating and running critical parts
Read more
Molly Hurley 崇福秋
smollyhurley
Just out today is my article for @BulletinAtomic! I talk about how the TPNW could be an opportunity to move towards a more post-colonial understanding of security. In particular, the
Read more
Glenn Greenwald
ggreenwald
The @ACLU spent years suing over the no-fly list, insisting it was a grave abuse of power.Does ACLU have a position on Schumer's call for Americans to be put on
Read more
Dangbana Orisa Skrrr
Adheydayor
With talks on the need for local value chains due to COVID-19 disrupting global supply chains and rising protectionism, is there any study of the impact on global food prices
Read more
Nathanael Tilahun
Nathanael_Ali
PM Abiy is correct that non-intervention is a cardinal principle of international law. But there are some exceptions to this principle. The Security Council could intervene if it decides that
Read more
PlanB
100trillionUSD
1) Did you know: Between 2010 and 2013 former Mike Hearn, then a tech lead at Google’s offices in Zurich, Switzerland, designed a security system that was later tapped by
Read more
Andrew Feinberg
AndrewFeinberg
NEW: Sources familiar with the presidential transition process as well as the behavior of @realDonaldTrump and authoritarian leaders worry that a delay in beginning the transition for a Biden administration
Read more
Trammell Hudson ✪
qrs
Signal PINs dramatically change their threat model and reverse their prior no-retention policy. The security of user data now stored on their servers relies entirely on SGX, which is barely
Read more
Muhammad Ali
Thecolistin
This is social engineering 101.In the clash of civilisations as per Coordinator of Security Planning for the National Security Council US in 1980s the next wars are culture dominated. His
Read more
Natasha Singer
natashanyt
Now it can be told: South Korea --a world leader in using digital tools against the pandemic-- had major security flaws in its quarantine app that could have allowed hackers
Read more
George Barros
georgewbarros
Are Russian security personnel operating in #Belarus? While there is no smoking gun, It’s entirely possible. I’ve been closely watching Belarus (and the Kremlin’s role there) since August. Here’s what
Read more
emptywheel
emptywheel
Watching House Homeland Security hearing on Domestic Terrorism. https://www.c-span.org/video/?508559-1/house-homeland-security-committee-hearing-domestic-terrorism&liveMike McCaul is among first to say Jan 6 was obviously DomTerr, he as
Read more
Justin Bons
Justin_Bons
1/7) BTC can never serve the world as a Store of Value with a flawed long term security modelThe idea that BTC security can be maintained with sustained high TX
Read more
Luke O'Brien
lukeobrien
NEW: I did a roundup of recent Russian attempts to attack the 2020 election while the Trump admin either suppresses intel about Russian political interference or gives Putin a hand
Read more
‹
1
2
...
20
21
22
23
24
25
26
...
625
626
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree