How to make accurate predictions:
(1) Assume the tech ends up getting to wherever you think it will;
(2) Imagine the absolute worst possible implementation of it in a genie’s curse sort of way.
From what I can tell, this will 𝘢𝘭𝘸𝘢𝘺𝘴 end up accurate.
I actually think cryptocurrency will turn into the opposite of what people hope for. Governments will create their own, infiltrate or co-opt existing standards to remove anonymity and give them control over monetary supply. And then ban alternatives to illegal undergrounds.
#FunFactFriday
- The Royal Navy has been testing Jet Suit assault teams to determine if the Iron Man-like suits could be used to rapidly swarm and board ships. U.S. Special Operations Command is also evaluating a jetpack that can reach speeds of more than 200 mph.
Jake’s not wrong. It’s just… annoying that he’s not wrong.
I spend so much time lately defending the IC from kooky conspiracy theorists that my default reaction when I saw this yesterday was basically “c’mon now, we both know firsthand…”
But the facts are the facts. It’s
@RayRedacted
The big question is whether it’s due to firings, or (more likely) security is suddenly getting the budget it’s been asking for (now that it’s too late).
But now I’d assert that cyber is the air that human security breaths. In a “fish can’t describe water, because they don’t know any world other than being in water” sort of way.
In the following sense:
Let’s say you’re a fish, and you’re focused on water security.
But… fish, for all essential purposes, don’t / can’t exist outside of water. So fish have security that isn’t water security
This is the future. We’re going to see more and more operational independence and self-financing as we move forward. And with heavily sanctioned states, we’ll see more frequent use of cryptocurrency as a means to circumvent these sanctions.
OPSEC note from the GRU operation to hack the DNC - Unit 26165 had their own bitcoin mining operation to generate funds for the operational cost of their effort. They were basically self-funding their own operational costs.
Dear
@Apple
, if my AirPods Max have been in this position a few rooms away for the last 20+ hours, the chances of me wanting that incoming call’s audio being sent to them is ~0%.
@realkimstover
They tried. We never cared (or even noticed in most cases)... then they went after Millennials and GenZ, and both groups reacted in exactly the ways that the bullies were hoping for, so they keep doing it. 🤷🏻♂️
Wait, so this would only removes ads in For You? 😂
How about give me the option to disable For You altogether, and remove ads in Following? Then I’d be sold.
The story behind this is that Radia Perlman, the “mother of the Internet,” said this to me back in like 2001. A few years ago,
@RayRedacted
and I printed it up on t-shirts and passed them out at Black Hat and DEFCON.
Another amazing year at the
@WarsawForum
! Congrats to my friends
@Pisarski
and
@KPisarska
on another huge success. A lot of great discussion that will lead to action. Check out this great summary video (and see me at the end!):
For 24 hrs, for every RT including a picture of your dog & an infosec book I'll donate $5 in your name to
@DianaInitiative
, a conference focused on Women, Diversity, & Inclusion in Information Security, embracing all genders, sexualities & skill levels.
Each photo RT=$5. Go!
Ah yes, because it would totally make sense for a country/service to blow the fact that they’ve successfully defeated modulo-reduced / differential log-reduced algorithms over… VPN traffic. lmao
At Mike Lindell's cyber-security summit, this "data scientist" just told attendess not to use
@ExpressVPN
because it is (allegedly) Chinese-owned and they are allegedly using Quantum Computing to snoop on your traffic.
News flash: VPN providers don't need QC to track traffic.
We did an investigation on this at the height of the Q panic, and we pretty much established (but couldn’t 100% prove) the several people who instigated Q and were likely to have been Q. There has been more than one Q, but none of them were Flynn.
Can we just stop with the sh*t that spycraft is changing and old school has gone, please? It's really not. Traditional HUMINT recruitment is fast adapting to the tech age, yet the principles remain the same.
@MalwareJake
Dork is just the perfect description. Anyone that’s ever had to carry, hates carrying. It’s such a pain. He’s obviously just a 2A cosplay nerd.
@LinuxHandbook
Learn to shell script (bash or any other shell). Learn a scripting language like Python or Perl too… but that doesn’t replace all the knowledge you’ll gain about the system and system internals that you’ll gain by learning to shell script.
When I was first learning to code and to exploit code, I didn’t have anyone to ask questions of… which led to (1.) probably taking much longer to learn everything, but (2.) gaining a pretty well developed ability to RTFM/research on my own and general self sufficiency.
I’m