Semantics are important, because the vast majority of the infosec community look at IOTA and dismiss it because of the games played with communication.
-
-
Replying to @cybergibbons @anonymous_iot9 and
Is this from your experience or do you estimate that the vast majority will dismisses it? I am curious
1 reply 0 retweets 1 like -
Replying to @Eskalier1 @anonymous_iot9 and
Yes, just look at the responses to the original tweet. Look at subreddits outside of /r/iota, look at how the media took the DCI report. There are also the cult-like fanboys. It all looks bad.
1 reply 0 retweets 1 like -
Replying to @cybergibbons @anonymous_iot9 and
Well in all honesty, that is not the ‘infosec’ community. Second, be ware of conflicts of interest. Debunked statements are tossed in over and over. If iota succeeds all these people fear their coin is obsolete. So there is incentive to bash iota
1 reply 0 retweets 1 like -
Replying to @Eskalier1 @anonymous_iot9 and
True on my examples, but I haven't yet spoken to anyone in infosec who considers IOTA anything but a joke. The "debunking" is all over the place though. Twitter, reddit, random gists. It's incoherent.
3 replies 0 retweets 2 likes -
Replying to @cybergibbons @Eskalier1 and
so how about this? get all your infosec buddies and break
$IOTA? use the method that DCI used. there’s been an open invitation to break and hack the protocol. it’s a honeypot worth billions. and if you and your friends can’t break it then you must be the one who’s joking.1 reply 0 retweets 1 like -
Replying to @c4chaos @cybergibbons and
~C4Chaos Retweeted David Sønstebø
here’s another challenge: get all your infosec expert buddies who are laughing at
$IOTA to come up with an attack vector. surely, experts can come up with something! use the DCI method, any method, any weakness you can expose. save us all from IOTA!https://twitter.com/DavidSonstebo/status/964636242594926592 …~C4Chaos added,
2 replies 0 retweets 0 likes -
Replying to @c4chaos @Eskalier1 and
There was a weakness - a hash function which was vulnerable to collisions meant that an adversary could harm the system as a whole. Even you god has claimed this.
2 replies 0 retweets 0 likes -
Replying to @cybergibbons @Eskalier1 and
~C4Chaos Retweeted Come-from-Beyond
that has been addressed as nauseum. no practical attack was demonstrated. and DCI repeatedly ignored the call to publish their code. see https://twitter.com/c___f___b/status/964603104216920066 …. also the Official
$IOTA Response was greeted by *crickets*

https://blog.iota.org/official-iota-foundation-response-to-the-digital-currency-initiative-at-the-mit-media-lab-part-1-72434583a2 …~C4Chaos added,
1 reply 0 retweets 0 likes -
Replying to @c4chaos @Eskalier1 and
So you are saying the "copy protection" didn't work then?
2 replies 0 retweets 0 likes
it has served its purposes. and now it’s no longer needed. so go find a weakness with your infosec experts buddies. the reward is high! it would be great for your careers if you can break $IOTA. and you can save a lot of us who are deluded to believe that IOTA is safe! thx! 

Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.