November 15, 2024
November 15, 2024
France’s former intelligence chief accused of spying for Louis Vuitton billionairehttps://t.co/O65j7wuZ2A
— Dr. Dan Lomas (@Sandbagger_01) November 14, 2024
What will Trump do with Biden's cyber agenda? Say goodbye to critical infrastructure security regulations, anti-spyware efforts, and AI safety, and say hello to more hacking against China.
— Eric Geller (@ericgeller) November 14, 2024
My new story for @WIRED: https://t.co/GrTm7FtHcD pic.twitter.com/sJHOlpfsZt
What's out:
— Eric Geller (@ericgeller) November 14, 2024
🟦 New cyber requirements for infrastructure sectors
🟦 CISA's remaining counter-misinformation efforts
🟦 AI security and oversight programs
🟦 Anti-spyware initiative
"More regulation will be dismantled than introduced," says former Trump CISA official @Brian4PA. pic.twitter.com/QIzbi2YUri
Evidence collected by @WhatsApp on NSO workers discussing WhatsApp hack over WhatsApp app (??!!🤦).
— Tal Be'ery (@TalBeerySec) November 15, 2024
Does it suggest that #WhatsApp is technically capable of circumventing its End-to-End-Encryption (E2EE)? @jsrailton @matthew_d_green https://t.co/tX4J108yF6
A valid question. If I had to guess I would say that some people had WhatsApp backups enabled pushing all the conversations to cloud storage. When discovery happened, that data would be available for collection.
This is exactly the reason that ephemeral messaging is so important. Self deleting messages keep your own devices clean from unwanted data.
If I am doing something illicit I don’t want a record of that on my device. I am also pragmatic and know that relying on manual cleaning is error prone. Automating that process is best for many reasons.
One simple reason is that deliberately destroying evidence that you believe could be used in a legal case is itself illegal. However, if you have a policy of destroying data that you strictly adhere to, then you’ve got a good case that it is routine and not tampering.
Of course, if the punishment for what you did is worse than for destroying evidence, by all means, be tactical in your criming.
NOTE: this is not legal advice.
From 10 meters, they can control your bicycle's gears: Multiple attack vectors on Shimano bicycles have been published. Useful for competitions & deadly for safety🛑🚴💥
— Denis Laskov 🇮🇱 (@it4sec) November 15, 2024
PDF: "MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles"https://t.co/lKx94BnXbe pic.twitter.com/fvbvWpsMNi