• Home
  • About

Saved searches

  • Remove
  • Verified account @
Suggested users
  • Verified account @
  • Verified account @
  • Language: English
    • Bahasa Indonesia
    • Bahasa Melayu
    • Català
    • Čeština
    • Dansk
    • Deutsch
    • English UK
    • Español
    • Filipino
    • Français
    • Hrvatski
    • Italiano
    • Magyar
    • Nederlands
    • Norsk
    • Polski
    • Português
    • Română
    • Slovenčina
    • Suomi
    • Svenska
    • Tiếng Việt
    • Türkçe
    • Ελληνικά
    • Български език
    • Русский
    • Српски
    • Українська мова
    • עִבְרִית
    • العربية
    • فارسی
    • मराठी
    • हिन्दी
    • বাংলা
    • ગુજરાતી
    • தமிழ்
    • ಕನ್ನಡ
    • ภาษาไทย
    • 한국어
    • 日本語
    • 简体中文
    • 繁體中文
  • Have an account? Log in
    Have an account?
    · Forgot password?

    New to Twitter?
    Sign up
By using Twitter’s services you agree to our Cookie Use and Data Transfer outside the EU. We and our partners operate globally and use cookies, including for analytics, personalisation, and ads.
SwiftOnSecurity's profile
i wont date you
i wont date you
i wont date you
@SwiftOnSecurity

i wont date you

@SwiftOnSecurity

I make stupid jokes, talk about consumer technology security, and use Oxford commas. I run @TayDiscus for long-form discussion.

Joined April 2014
  • © 2016 Twitter
  • About
  • Help
  • Terms
  • Privacy
  • Cookies
  • Ads info
Dismiss
Previous
Next

Go to a person's profile

Saved searches

  • Remove
  • Verified account @
Suggested users
  • Verified account @
  • Verified account @

Retweet this to your followers?

Optional comment for Retweet
 
 

Saved searches

  • Remove
  • Verified account @
Suggested users
  • Verified account @
  • Verified account @
140

Are you sure you want to delete this Tweet?

Promote this Tweet

Block

  • Add a location to your Tweets

    When you tweet with a location, Twitter stores that location. You can switch location on/off before each Tweet and always have the option to delete your location history. Learn more

    Profile summary

    Your lists

    Create a new list


    Under 100 characters, optional

    Privacy

    Your reply includes the people in this conversation up to this point. Learn more

    Copy link to Tweet

    Embed this Tweet

    Embed this Video

    Add this Tweet to your website by copying the code below. Learn more

    Add this video to your website by copying the code below. Learn more

    Hmm, there was a problem reaching the server.

    Preview

    Log in to Twitter

    · Forgot password?
    Don't have an account? Sign up »

    Sign up for Twitter

    Not on Twitter? Sign up, tune into the things you care about, and get updates as they happen.

    Sign up
    Have an account? Log in »

    Two-way (sending and receiving) short codes:

    Country Code For customers of
    United States 40404 (any)
    Canada 21212 (any)
    United Kingdom 86444 Vodafone, Orange, 3, O2
    Brazil 40404 Nextel, TIM
    Haiti 40404 Digicel, Voila
    Ireland 51210 Vodafone, O2
    India 53000 Bharti Airtel, Videocon, Reliance
    Indonesia 89887 AXIS, 3, Telkomsel, Indosat, XL Axiata
    Italy 4880804 Wind
    3424486444 Vodafone
    » See SMS short codes for other countries

    Confirmation

     

    Buy Now

    Hmm... Something went wrong. Please try again.

    Previous Tweet
    i wont date you ‏@SwiftOnSecurity Feb 24

    SHA1 refuses to die as Mozilla jumps on bandwagon allowing their continued issuance https://blog.mozilla.org/security/2016/02/24/payment-processors-still-using-weak-crypto/ …

    • Retweets 71
    • Likes 40
    • Daniela Joel Suzeanne Speir Peter Cawdron Mariano OrangeNinja TokyoPop Chris Vermilion Ryan Sleevi Mark McLennan
    7:19 PM - 24 Feb 2016
    71 retweets 40 likes
      1. Ryan Sleevi ‏@sleevi_ Feb 24

        @SwiftOnSecurity It's like deja-vu all over again! https://bugzilla.mozilla.org/show_bug.cgi?id=966350 …

        0 retweets 3 likes
      2. Ryan Sleevi ‏@sleevi_ Feb 24

        @SwiftOnSecurity At least we know what stories work, and which don't https://cabforum.org/pipermail/public/2015-September/005935.html … https://cabforum.org/pipermail/public/2015-December/006488.html … https://cabforum.org/pipermail/public/2013-June/001638.html …

        2 retweets 4 likes
      1. koumdros ‏@koumdros Feb 24

        @SwiftOnSecurity troubled re #Mozilla's ambiguity about the time sha1 timeframe. What exactly is "for a while longer"? Weeks? Months? Years?

        0 retweets 1 like
      2. View other replies
      3. Show more
    1. Patrick Kelley ‏@MonkeySecurity Feb 24

      @SwiftOnSecurity we need to abandon this binary secure/insecure mindset and realize there are many shades.

      0 retweets 1 like
    2. cyber amigo ‏@kevvyg Feb 24

      @SwiftOnSecurity if you ignore it long enough, the weak hashing algorithms will just... go away 🙈🙉🙊

      0 retweets 1 like
    3. Sam Sun ‏@samczsun Feb 25

      @SwiftOnSecurity If SHA1 ran for president it would have a better chance than most of the candidates

      0 retweets 1 like
    4. Jeff Hart ‏@jeffreyahart Feb 24

      @SwiftOnSecurity mmmm hash....

      0 retweets 1 like
    5. Suzanne Aldrich ‏@SuzanneAldrich Feb 24

      @SwiftOnSecurity I would have just rejected the SHA-1 request. "Sucks to be you!" Force payment processors to actually secure their shit.

      0 retweets 0 likes
    6. Chris Siebenmann ‏@thatcks Feb 24

      @SwiftOnSecurity If Mozilla pulled Symantec's root certs over this, probably a bunch of Firefox users migrate to some other browser.

      0 retweets 0 likes
    7. Chris Siebenmann ‏@thatcks Feb 24

      @SwiftOnSecurity I see this less as 'Mozilla jumps on the bandwagon' and more as 'Mozilla loses a facedown with CAs'.

      0 retweets 0 likes
    8. Adrian Wilkins ‏@dr_barnowl Feb 25

      @SwiftOnSecurity main thing keeping SHA-1 alive for me is it's use in Git.

      0 retweets 0 likes
    9. Andrew Fry ‏@AndrewTFry Feb 24

      @SwiftOnSecurity ugh

      0 retweets 0 likes
    10. Matthew LaPointe ‏@toomuchnoise Feb 24

      @SwiftOnSecurity whyyyyyyyyyyyy????

      0 retweets 0 likes
    11. ㅤ ‏@furt1v3ly Feb 24

      @SwiftOnSecurity the SHA-1 hash for “#Facepalm” is #87cba44a452b131108828f4a7053bda6187ab7e1 Enjoy!

      0 retweets 0 likes

    Loading seems to be taking a while.

    Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

      Promoted Tweet

      false

      • © 2016 Twitter
      • About
      • Help
      • Terms
      • Privacy
      • Cookies
      • Ads info