-

Twitter avatar for @anothercohen
Alex Cohen @anothercohen
I'm not going to lie, this is the most entertaining exit interview I've ever witnessed
Image
Image
Twitter avatar for @iamharaldur
Halli @iamharaldur
Hi again @elonmusk 👋

I hope you are well.

I’m fine too. I’m thankful for your interest in my health.

But since you mentioned it, I wanted to give you more info.

I have muscular dystrophy. It has many effects on my body.

Let me tell you what they are:

Twitter avatar for @elonmusk
Elon Musk @elonmusk
@anothercohen The reality is that this guy (who is independently wealthy) did no actual work, claimed as his excuse that he had a disability that prevented him from typing, yet was simultaneously tweeting up a storm.

Can’t say I have a lot of respect for that.

-

Twitter avatar for @henryevil
📚 Andrew 📚 @henryevil
Working on site today
Image

-

Twitter avatar for @Georg_Heil
Georg Heil @Georg_Heil
🧵 #Nordstream attack: According to our joint investigation of @ARDKontraste @DIEZEIT @GoetschenbergM (ARD Hauptstadstudio) @terrorismus (SWR)

German investigators identified a Yacht that started from #Rostock on September 6th 2022 - aboard a commando of six persons…

lol

-

This sort of action — leaking intelligence assessments to the press to reshape the narrative — is exactly what Russia understands as information warfare. Information warfare is their broader concept that encompasses cyber.

Caveat: apparently the German reporters have been working this story for a long time unrelated to the NYT.

-

Poll: Young people in 13 EU countries refuse surveillance of online communication – Press Release

According to the results of the survey, 80% of young people aged 13 to 17 years old from 13 EU Member States would not feel comfortable being politically active or exploring their sexuality if authorities were able to monitor their digital communication, in order to look for child sexual abuse.

  • 66% of respondents don’t approve of internet providers monitoring their digital communication for suspicious content

  • 67% rely on encrypted communication apps like WhatsApp or Signal

  • 56% consider their anonymity crucial for their activism and for organising politically among peers

  • 1 in 3 respondents use communication apps, dating apps, or other apps to send intimate photos

Aha! No wonder the little criminals don’t want to be surveilled!! A third of them are sending underage sexual material to people!@!@#


-

-

It's all of them!

Why? Because rebel groups - even those receiving direct sponsorship - don't work for states. They have their own agency, motivations, goals. They will have been waging ops against the target long before the "sponsoring" state came along

1/7

Twitter avatar for @shashj
Shashank Joshi @shashj
I'd like a potted history from @RoryCormac of covert operations conducted by private groups sympathetic to a state but not working for it ... https://t.co/F5XUQRVUJZ

-

Twitter avatar for @shwauby
rat facts, PhD 🐀 @shwauby
Finally some good news
Image

-

Twitter avatar for @JustineTunney
Justine Tunney @JustineTunney
I've just implemented the most wildly heroic SIGSEGV hack, to get my virtual machine to support fast self-modifying RWX memory. Read all about it here:

-

Twitter avatar for @OldM4nHunting
Jenny @OldM4nHunting
Checkout my write-up (with @secfaultsec) on an object deserialization flaw in the Visual Studio App Center SDK for iOS and macOS. I hope you enjoy joining me on this journey.

-

Twitter avatar for @Birdyword
Mike Bird @Birdyword
Some people say they don't like Twitter, but last night I saw a British guy with a Lee Kuan Yew avatar get into it with an American guy with a Zhao Ziyang avatar over the issue of shrimp welfare. Ultimately if you're tired of this site you're tired of life.

-

Twitter avatar for @bodonoghue85
Brendan O'Donoghue @bodonoghue85
New book coming out
Image

-

Twitter avatar for @AndrewMohawk
AndrewMohawkᴵ'ᵐ ᶠᶦⁿᵉ ᵗʰᵃⁿᵏˢ, ᴬⁿᵈʳᵉʷˀ @AndrewMohawk
"The most severe vulnerability in this section could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation"

yikes.

-

Don't miss what's next. Subscribe to the grugq's newsletter: