SwiftOnSecurity

SwiftOnSecurity

avatar
@SwiftOnSecurity@infosec.exchange
查看详情

TechCrunch

Meta plans to build a $10B subsea cable spanning the world, sources say | TechCrunch

Meta, the parent of Facebook, Instagram, and WhatsApp, is the second-biggest driver of internet usage globally. Its properties — and their billions of

0
0
1
avatar
@SwiftOnSecurity@infosec.exchange

@munin I will re study the material

查看详情
0
0
1
avatar
@SwiftOnSecurity@infosec.exchange

@munin you have a faith I do not.

查看详情
0
0
1
avatar
@SwiftOnSecurity@infosec.exchange

And in the final exhalation of the face of who you are now, you will feel satisfaction of the person you were before. You have slain the enemy of your cause. You have killed yourself. And in the moment before the temporal garbage collector triggers, you will find divinity. It was you. It was you the entire time.

查看详情
0
0
1
avatar
@SwiftOnSecurity@infosec.exchange

Some day you will have this experience and all your excoriation of the stupid fools then will flash before your eyes because you are the stupid fool today. You will watch it happen to you as you performed before. Time will complete its circle in a horror whose photons are polarized to only your eyes. The knife you hold will enter your chest.

查看详情
0
0
1
avatar
@SwiftOnSecurity@infosec.exchange

There are compensating controls and defense complexities that delayed or simply didn't work in many cases, through even further complexity. A narrative of how the attacker made 1=1 is not the complete story but telling that is so full of minutia and NDA it's basically not worth trying.

查看详情
0
0
1
avatar
@SwiftOnSecurity@infosec.exchange

There are two stages of a security career: Before you know the truth of what you read in the news on an incident, and after, when you know exactly what happened and can't say a single fucking thing.

查看详情
0
0
2
avatar
@SwiftOnSecurity@infosec.exchange

This feature was often used for signing up for "Social Media Dashboards." I know because I did it. This mean Twitter may technically have access to EVERY social account on EVERY platform to those who did it. (I never polluted streams, others def did.)

One of the highest importance things in Security is thinking as a Graph not a List. Owning Twitter doesn't get you Twitter. It gets you everything that trusts Twitter.

Article by John Lambert, one of the seniormost Microsoft people who has his hand fighting their greatest battles.
medium.com/@johnlat... @johnlatw

查看详情

Medium

Defender’s Mindset

This is a collection of thoughts, quips, and quotes from tweets, blogs, and presentations over the years. If you find them helpful, drop me…

0
0
1
avatar
@SwiftOnSecurity@infosec.exchange

Twitter is a sign-in identity provider too... And revoking access at Twitter or deleting your account does not necessarily break that delegation token...
I trust their security team made this happen. But it's not intrinsic.

If you've ever "Logged in" to a website or app with Twitter, you created an account with a secret Twitter holds on its servers. You don't sign in with your Twitter account. You sign in with an OAUTH token Twitter owns.

查看详情
0
0
0
avatar
@SwiftOnSecurity@infosec.exchange

Inventor of diesel engine was an egalitarian socialist author and published scientist who envisioned his creation running on peanut oil and freeing the populace from manual work by distributing power to the many, in stark contrast with behemoth industrial steam engines controlled by industrialists.

查看详情
0
0
0
avatar
@SwiftOnSecurity@infosec.exchange

Confuse your conservative relatives by saying Hunter Biden should be pardoned because the government shouldn't have the right to deprive you of owning a firearm.

查看详情
0
0
5
avatar
@SwiftOnSecurity@infosec.exchange

It's barely Monday and I've already been cybered

查看详情
0
0
0
avatar
@SwiftOnSecurity@infosec.exchange

Every enterprise SaaS salesperson after leaving the Zoom

查看详情
0
0
0
没有更多数据了