Stratechery
Zero Trust Information
12+ min · · Zero Trust Networking is security with Internet assumptions; there is tremendous value if we apply the same approach to information. · Shared by 511, including Scott Monty, Jonathan Kogan, Linus Basig, Andrew Ermogenous, Ben Thompson, LoriBeth, Steven Sinofsky, Keerthi G, 🌴Marc Averitt🌴, Christian Surchi, Max Niederhofer, Brian Armstrong 🛡️, Mark Kaigwa, Merkstatt@troet.cafe 📯, Rifki Caesar Novaldin, 💥💥 Larson Reever🇺🇸, Konrad Weber, Balaji, Tom Connor, Mark Little
lspace.swyx.io
Reverse Prompt Engineering for Fun and (no) Profit
10 min · · Pwning the complete prompt source of Notion AI... and why everyone is wrong about prompt injection · Shared by 380, including Ben Tossell, 瑞拿頭, hiten.eth
The Guardian
On the trail of the Dark Avenger: the most dangerous virus writer in the world
15+ min · · The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why? · Shared by 377, including Scott Shapiro, The Last Shitposter, Oliver Raduner, 🇺🇦Evan Kirstel #B2B #TechFluencer, 瑞拿頭, @grzewap@mastodon.social
MIT Technology Review
Three ways AI chatbots are a security disaster
1 min · · Large language models are full of security vulnerabilities, yet they’re being embedded into tech products on a vast scale. · Shared by 196, including Stephanie A Kowalski, @timnitGebru@dair-community.social on Mastodon, 瑞拿頭, Mike Tamir, PhD, Thomas Pleil
The Guardian
The US has suffered a massive cyberbreach. It's hard to overstate how bad it is
7 min · · This is a security failure of enormous proportions – and a wakeup call. The US must rethink its cybersecurity protocols · Shared by 191, including Swebliss, 🇺🇦Evan Kirstel #B2B #TechFluencer, 瑞拿頭, Bill Slawski ⚓ 🇺🇦, l. ones, Marc Abrahams, Matthias Lampe, Thomas Pleil, Fern
Citizen Lab
Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings
16+ min · · This report examines the encryption that protects meetings in Zoom and finds that they have made their own encryption scheme and has significant weaknesses. · Shared by 174, including Marc R Gagné MAPP, Diogo Mónica, Mark Tabladillo PhD, 𝚛𝚘𝚐𝚎𝚛, Cameron Yick ~ @hydrosquall@vis.social on mastodon, Neuropsychology, Evan Selinger, James Wooden, Faik Ersoy, Chris Messina, Dan Gillmor is at mastodon.social/@dangillmor, 瑞拿頭, kipit, Aral Balkan, Christian Surchi, Charlie O'Keefe @charlieok@hachyderm.io, Matthew Green
WIRED
Signal Is Finally Bringing Its Secure Messaging to the Masses
6 min · · The encryption app is putting a $50 million infusion from WhatsApp cofounder Brian Acton to good use, building out features to help it go mainstream. · Shared by 158, including Matthias Lampe, Jennifer Ouellette, 瑞拿頭, Marc R Gagné MAPP, Backchannel, Matthew Green, mastodon.social/@renestalder, Philippe, Charlie O'Keefe @charlieok@hachyderm.io, Merkstatt@troet.cafe 📯, Johannes Lenz, Axel Rauschmayer (INACTIVE), Ben Lorica 罗瑞卡, Michael Arrington 🏴☠️ 🛡️, 🇺🇦Evan Kirstel #B2B #TechFluencer, Rick Powell
github.com
drduh/macOS-Security-and-Privacy-Guide
· macOS-Security-and-Privacy-Guide - A practical guide to securing macOS. · Shared by 142, including melbic, Alberto, Stephen C Sanders, Thomas Spreng, Faik Ersoy, Pascal Birchler, Bryan Onel, Daniel Behrendt, Jon Thompson, shishir das, masone, Francis DB, hardmaru, Philippe, Philipp Laurim, Diogo Mónica, Yann “不停” Heurtaux ⏚ @shalf@mastodon.social, Vojtěch Hýža, Simon07, Lukas Westermann
WIRED
The Clever Cryptography Behind Apple's 'Find My' Feature
4 min · · Apple says an elaborate rotating key scheme will soon let you track down your stolen laptop, but not let anyone track you. Not even Apple. · Shared by 112, including Charlie O'Keefe @charlieok@hachyderm.io, 瑞拿頭, Vikram Dutt, Claudia Sommer, Backchannel, Niklaus Gerber, Oliver Raduner, Thomas Power, Sam Spurrell
medium.com
The Most Expensive Lesson Of My Life: Details of SIM port hack
5 min · · I lost north of $100,000 last Wednesday. It evaporated over a 24 hour timespan in a “SIM port attack” that drained my Coinbase account. · Shared by 104, including Marcos, Stephan Werner, Nico Müller 🇺🇦, Korben, Christopher Allen, Mark Kaigwa, tcherno, Marsha Collier, Joe Lencioni, 瑞拿頭, Mattias Tyrberg
VICE
These Legit-Looking iPhone Lightning Cables Will Hijack Your Computer
2 min · · It looks like an Apple lightning cable. It works like an Apple lightning cable. But it will give an attacker a way to remotely tap into your computer. · Shared by 103, including Thomas Pleil, Sachin Rekhi, Ronald van Loon, Gerrit Eicker, Benedict Evans, L. Taylor Banks, Dayyan Smith, ἀποκαραδοκία, Brian Solis, 瑞拿頭, Andrew Wilkinson, Lukas Stickelberger, Aimee Meifeu ✍️⚖️, Ste Davies, Philippe
scottaaronson.com
Scott’s Supreme Quantum Supremacy FAQ!
· Shared by 98, including Christopher D. Long, Peter Todd/mempoolfullrbf=1, Joanna J Bryson, Taylor Pearson, #MuskOut (not parody), 瑞拿頭, Ari Paul ⛓️, tylercowen, Kirk Borne, R.NFT R “Ray” Wang 王瑞光 #1A #AI, Christopher Allen, Guillermo Rauch, Howard Getson, Kent Bye (Voices of VR), Balaji, Logical Analysis, zooko❤ⓩ🛡🦓🦓🦓
Forbes
The Encryption Debate Is Over - Dead At The Hands Of Facebook
3 min · · The sad reality of the encryption debate is that after 30 years it is finally over: dead at the hands of Facebook. · Shared by 95, including Jochen Burkhard, Yvette Dubel, Elena Neira, Fern, 瑞拿頭, Gerrit Eicker, Charles Baldwin, 𝚛𝚘𝚐𝚎𝚛, Miguel, Luca Like, Chris {he, they} , Gianluca Diegoli
WIRED
Cyberwar: The Complete Guide
16+ min · · The threat of cyberwar looms over the future: a new dimension of conflict capable of leapfrogging borders and teleporting the chaos of war to civilians thousands of miles beyond its front. · Shared by 89, including The Cipher Brief, Luca Like, Matthias Lampe, Ronald van Loon, 瑞拿頭, 🇺🇦Evan Kirstel #B2B #TechFluencer, Terence Mills, Merkstatt@troet.cafe 📯, Oliver Raduner, Javi Cantón @javicanton@mas.to, Backchannel, Katja Evertz
Wolfram
The Solution of the Zodiac Killer’s 340-Character Cipher—Wolfram Blog
8 min · · See how Mathematica was used to solve one of the cryptograms sent in a letter by the Zodiac Killer. · Shared by 83, including Cameron Yick ~ @hydrosquall@vis.social on mastodon, 瑞拿頭
Forbes
These 20 ‘Hackers’ Helped Shape The Cybersecurity Landscape Forever
7 min · · I asked cybersecurity experts to name the hackers who have made an impact, good or bad, that has helped shape the security landscape today. · Shared by 78, including Matthias Lampe, 瑞拿頭