April 25, 2022
This is spectacular. Really cool stuff!
This clusterfuck operation is so bad it is comical.
If you program, you write bugs. But, there’s help.
https://www.debuggingbook.org/html/Importing.htmlGood stuff on how Russian disinformation can be countered (effectively).
Anatomy of an Info-War: How Russia’s Propaganda Machine Works, and How to Counter It | StopFake
https://www.stopfake.org/en/anatomy-of-an-info-war-how-russia-s-propaganda-machine-works-and-how-to-counter-it/Samuel Gross’ Offensive con talk on attacking JavaScript engines.
Some wisdom from Dave “Dark Tan” Aitel.
https://cybersecpolitics.blogspot.com/2022/04/forecasting.htmlI wonder how much of this is local sabotage vs. Ukrainian special forces. We’ll probably never know for sure.
Australian spies helped expose secret pact between China and Solomon Islands
https://intelnews.org/2022/04/25/01-3191/I guess this is the exception to public private partnership track record.
If you have the chance to be part of i100 my advice is grab it with both hands. It is one of the most fulfilling things I have ever done personally/professionallyDave throwing some shade. It’s cool how “making a cogent observation” and “throwing shade” are the same thing when talking about the FBI
Exploit devs talking bug hunting
If patching worked you’d only have to do it once? I guess? It seems like one of those bad faith “if X worked then why doesn’t it work?” arguments where the dichotomy is false and the points don’t matter. Just patch your shit.
My philosophy is: make them earn their paycheck. If the adversary has to work for it, then it’s a win.