the grugq's newsletter

Subscribe
Archives
February 16, 2024

February 16, 2023

February 16, 2023

GitHub - apernet/OpenGFW: OpenGFW is a flexible, easy-to-use, open source implementation of GFW (Great Firewall of China) on Linux

OpenGFW is a flexible, easy-to-use, open source implementation of GFW (Great Firewall of China) on Linux - apernet/OpenGFW


NY Mag's personal finance columnist was convinced by a cold caller claiming to be a CIA agent in Langley that she needed to empty her bank account, put the money in a shoebox and give it to a guy coming to meet her on the street. https://t.co/c7vbLZ5kun pic.twitter.com/4k0fVSGlUD

— Tom Gara (@tomgara) February 15, 2024

This is an incredibly important article and Charlotte Cowles (@charlottecowles) should be praised for writing it. Everybody should read it.https://t.co/2tGLIU3sg9

People laughing at her for getting scammed are missing the point, such as what the following picture does. pic.twitter.com/TmSu3ZkRMv

— Robᵉʳᵗ Graham 𝕏 (@ErrataRob) February 16, 2024

Thread by @ErrataRob on Thread Reader App – Thread Reader App

@ErrataRob: This is an incredibly important article and Charlotte Cowles (@charlottecowles) should be praised for writing it. Everybody should read it. People laughing at her for getting scammed are missing the poin...…

Alternative theory, lol:

What if you lied to your husband about where $50k went and then you got so deep into the lie that you had to write a Cut article on it and get dunked on

— Sophia Benoit (@1followernodad) February 15, 2024

Related:

Canal+ Man in the Closet - YouTube

Canal +


U.S. conducted cyberattack on suspected Iranian spy ship.https://t.co/T1uq9nziZ4

— Brett Callow (@BrettCallow) February 15, 2024

I’ve been speaking at conferences about how hacking is about hacking systems; not just the computers but the whole system of people technology and process.

When we talk about the way that an exploit requires a vulnerable system on the other side, it isn’t restricted to just the computer system. The entire system needs to be vulnerable for the hack to have an effect.

I bring this up because many targets for hacks are simply not very vulnerable to cyber. There were complaints that Cyber Command never managed to be very effective against ISIS. At the time I said ISIS isn’t particularly vulnerable to cyber, and I maintain that position.

You can’t cyber someone into the Stone Age if they’re living in the Middle Ages.


Administriva

For the next 4 weeks newsletters will sometimes be short. I have a major project due on March 14th, with deadlines every week before then. Some days I simply don’t have time to doomscroll.

Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X