The largest #security breaches over the last year in one graph. #hackingpic.twitter.com/CK1Ir0hDi1
Blockchain, cryptocurrency, and smart contracts pioneer. (RT/Fav/Follow does not imply endorsement). Blog: http://unenumerated.blogspot.com
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
Add this Tweet to your website by copying the code below. Learn more
Add this video to your website by copying the code below. Learn more
By embedding Twitter content in your website or app, you are agreeing to the Twitter Developer Agreement and Developer Policy.
| Country | Code | For customers of |
|---|---|---|
| United States | 40404 | (any) |
| Canada | 21212 | (any) |
| United Kingdom | 86444 | Vodafone, Orange, 3, O2 |
| Brazil | 40404 | Nextel, TIM |
| Haiti | 40404 | Digicel, Voila |
| Ireland | 51210 | Vodafone, O2 |
| India | 53000 | Bharti Airtel, Videocon, Reliance |
| Indonesia | 89887 | AXIS, 3, Telkomsel, Indosat, XL Axiata |
| Italy | 4880804 | Wind |
| 3424486444 | Vodafone | |
| » See SMS short codes for other countries | ||
This timeline is where you’ll spend most of your time, getting instant updates about what matters to you.
Hover over the profile pic and click the Following button to unfollow any account.
When you see a Tweet you love, tap the heart — it lets the person who wrote it know you shared the love.
The fastest way to share someone else’s Tweet with your followers is with a Retweet. Tap the icon to send it instantly.
Add your thoughts about any Tweet with a Reply. Find a topic you’re passionate about, and jump right in.
Get instant insight into what people are talking about now.
Follow more accounts to get instant updates about topics you care about.
See the latest conversations about any topic instantly.
Catch up instantly on the best stories happening as they unfold.
The largest #security breaches over the last year in one graph. #hackingpic.twitter.com/CK1Ir0hDi1
@peterjmsimons @nickszabo4 we've known about breach vulnerability empirically since 2002 - SB1386. Only surprise is when change will happen?
@iang_fc @peterjmsimons As long as sys admins insist on full root access, instead of separation of duties, problems will continue.
@iang_fc @NickSzabo4 @peterjmsimons The problem isn't always sysadmins, the problem is often devs who need to see what's encrypted.
@wolfoftheair @nickszabo4 @peterjmsimons Need to establish procedure for routine access, dual party; and extraordinary access.
@wolfoftheair @nickszabo4 @peterjmsimons If we had systems where the riles were simple and followed, yes. Where we had consumer buy-in, yes.
@iang_fc @NickSzabo4 @peterjmsimons It'd be a lot easier to get consumer buy-in if they were actually documented and not hidden backdoors.
@wolfoftheair @nickszabo4 @peterjmsimons and you wan't get open doco unless the author wants to consider herself one of the consumers.
@iang_fc @NickSzabo4 @peterjmsimons Until gov't is considered one of the consumers, as well. And until gov't subsidizes some portion of it.
@iang_fc @NickSzabo4 @peterjmsimons Without gov't access, gov't just seizes passwords and keys.
@wolfoftheair @iang_fc @peterjmsimons That makes them go through normal legal procedural channels -- win.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.