April 25, 2022
This is spectacular. Really cool stuff!
This clusterfuck operation is so bad it is comical.
If you program, you write bugs. But, there’s help.
https://www.debuggingbook.org/html/Importing.html
Good stuff on how Russian disinformation can be countered (effectively).
Anatomy of an Info-War: How Russia’s Propaganda Machine Works, and How to Counter It | StopFake
Samuel Gross’ Offensive con talk on attacking JavaScript engines.
https://saelo.github.io/presentations/offensivecon_22_attacking_javascript_engines.pdf
Some wisdom from Dave “Dark Tan” Aitel.
https://cybersecpolitics.blogspot.com/2022/04/forecasting.html
I wonder how much of this is local sabotage vs. Ukrainian special forces. We’ll probably never know for sure.
Australian spies helped expose secret pact between China and Solomon Islands
https://intelnews.org/2022/04/25/01-3191/
I guess this is the exception to public private partnership track record.
Dave throwing some shade. It’s cool how “making a cogent observation” and “throwing shade” are the same thing when talking about the FBI
Exploit devs talking bug hunting
If patching worked you’d only have to do it once? I guess? It seems like one of those bad faith “if X worked then why doesn’t it work?” arguments where the dichotomy is false and the points don’t matter. Just patch your shit.
My philosophy is: make them earn their paycheck. If the adversary has to work for it, then it’s a win.