May 6, 2022
Cloud hacking tools, cool.
Cyber war was calvinball first!
Here’s some nightmare fuel. Exploiting ad tech to find women who’ve had abortions and collect the $10k Texas bounty at scale. As just one example…
Everything is cyber, so everything can be used for warfare. Cyber warfare is hectic.
Some legal analysis. One thing I’ll say is that for the last few years the people freaking out on twitter have been more accurate than the experts…
Reverse engineer cars.
Here’s an explainer on how your phone is tracking everything
Crypto. Scam. Fraud. Plot twist, this time it’s PGP.
US and Ukraine intelligence cooperation
1. Setting up the information theater before the war to expect Russian disinformation and false flags. 2. Preventing a chemical weapons attack. 3. Preparing for Victory Day.A researched informed analysis of what probably happened to Moskva. Hint, the radars are in the stowed away not doing anything, position.
Meta née Facebook is still a garbage company.
There was a supply chain vulnerability in ruby gems. There’s no indication it has been exploited in the wild.
https://github.com/rubygems/rubygems.org/security/advisories/GHSA-hccv-rwq6-vh79Ghidra plug-in for improved graph layout
github.com/sar5430/RizinL…Stop this timeline. I want to get off. What a world where this is actually relevant in 2022.
I am deeply sceptical about this. Zach is a good journalist so I’ll give him the benefit of the doubt. But it seems very unlikely to me.
Why even if a logless VPN were truly logless, it still is not a privacy layer.
Nakasone stays on.