February 16, 2023
February 16, 2023
GitHub - apernet/OpenGFW: OpenGFW is a flexible, easy-to-use, open source implementation of GFW (Great Firewall of China) on Linux
OpenGFW is a flexible, easy-to-use, open source implementation of GFW (Great Firewall of China) on Linux - apernet/OpenGFW
NY Mag's personal finance columnist was convinced by a cold caller claiming to be a CIA agent in Langley that she needed to empty her bank account, put the money in a shoebox and give it to a guy coming to meet her on the street. https://t.co/c7vbLZ5kun pic.twitter.com/4k0fVSGlUD
— Tom Gara (@tomgara) February 15, 2024
This is an incredibly important article and Charlotte Cowles (@charlottecowles) should be praised for writing it. Everybody should read it.https://t.co/2tGLIU3sg9
— Robᵉʳᵗ Graham 𝕏 (@ErrataRob) February 16, 2024
People laughing at her for getting scammed are missing the point, such as what the following picture does. pic.twitter.com/TmSu3ZkRMv
Thread by @ErrataRob on Thread Reader App – Thread Reader App
@ErrataRob: This is an incredibly important article and Charlotte Cowles (@charlottecowles) should be praised for writing it. Everybody should read it. People laughing at her for getting scammed are missing the poin...…
Alternative theory, lol:
What if you lied to your husband about where $50k went and then you got so deep into the lie that you had to write a Cut article on it and get dunked on
— Sophia Benoit (@1followernodad) February 15, 2024
Related:
Canal+ Man in the Closet - YouTube
Canal +
U.S. conducted cyberattack on suspected Iranian spy ship.https://t.co/T1uq9nziZ4
— Brett Callow (@BrettCallow) February 15, 2024
I’ve been speaking at conferences about how hacking is about hacking systems; not just the computers but the whole system of people technology and process.
When we talk about the way that an exploit requires a vulnerable system on the other side, it isn’t restricted to just the computer system. The entire system needs to be vulnerable for the hack to have an effect.
I bring this up because many targets for hacks are simply not very vulnerable to cyber. There were complaints that Cyber Command never managed to be very effective against ISIS. At the time I said ISIS isn’t particularly vulnerable to cyber, and I maintain that position.
You can’t cyber someone into the Stone Age if they’re living in the Middle Ages.
Administriva
For the next 4 weeks newsletters will sometimes be short. I have a major project due on March 14th, with deadlines every week before then. Some days I simply don’t have time to doomscroll.