November 3, 2022
I wrote something new: Ways to think about a 'metaverse'. What does anyone mean when they say that, and what might happen next? And where are we with VR?
ben-evans.com/benedictevans/…
-
Exploiting static site generators.
https://blog.assetnote.io/2022/10/28/exploiting-static-site-generators/
-
You see confusion, chaos and bad management. I see 5 promotions. Congratulations!
Tom Gara @tomgara
-
-
-
-
-
Found this video on Youtube, "Underground Fone Phreaking" (1990) starring Milo Fonbil and distributed by Alternative Inphormation. Covers blue boxes, red boxes, and other phreaking hardware/software. youtube.com/watch?v=nls9nZ… Mirrored on IA here, archive.org/details/underg…
-
We succeeded in recreating a Neolithic flatbread!
This is about as close as I can figure out how to make bread as it would have been baked in one of the first daily bread-making cultures, ca. 9,000 years ago. I’ll let you judge the authenticity…but the taste is fantastic.
-
Important & very good paper on the cyber dimension of the Russia/Ukraine war by my former GCHQ colleague Marcus Willett, now @IISS_org . Big contribution to the debate.
-
I did so much research on grain supply chains helping @DAlperovitch prepare his podcast on wheat security that I was getting farm machinery ads for months. Back to creepy defence contractor advertising now… but this is good news! https://t.co/lWiAIfTE5R
Javier Blas @JavierBlas
-
so some dread prophecy is 100% about to come to pass, right?
MyOutdoors @MyOutdoors
-
I looked into this. It seems that even though there exists a fuzz testing harness for X.509 and it's used by both devs and OSS-Fuzz, it does not cover a large portion of parsing code because it does not invoke X509_verify_cert.
Time to inspect coverage :(
allsoftwaresucks.blogspot.com/2022/11/why-cv…
hanno💉💉💉💉 @hanno
-
Current quantum computers, like those in IBM Q cloud, leak information. IBM Q found to be vulnerable to information leaks. Directly: quantum computers already have security vulns in them! They’re getting hacked. First example of a hacked quantum computer? That was fast. Congrats!
-
How a simple web-app assessment lead to complete #AzureAd tenant takeover 🤯
🧵 👇
#Azure #AzureKubernetesService #aks #Kubernetes #KubernetesSecurity #k8s #bugbounty #bugbountytips #bugbountytip #DevSecOps
-
How Birdwatch works (cc: everyone mischaracterizing it since Musk took over the platform) arxiv.org/pdf/2210.15723…
-
If you missed my virtual presentation at @umichTECH last week, along with an excellent conversation with @elodievialle, you can now check out the recording here.
-
Sadly, this means that astronomic observations with ALMA are currently suspended.
"ALMA Services Affected by Cyberattack":
-
One of the things I occasionally get paid to do by companies/execs is to tell them why everything seemed to SUDDENLY go wrong, and subs/readers dropped like a stone.
So, with everything going on at Twitter rn, time for a thread about the Trust Thermocline /1
-