Tweets

You blocked @daveaitel

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @daveaitel

  1. Retweeted
    1 hour ago

    To be fair you didn’t need a 0-day to steal we had some nasty source code leaker among ourselves.

    Undo
  2. Retweeted
    5 hours ago

    Congrats to ⁦⁩, ⁦⁩ undergrad turned MS student for this great write up of her work with Brian Arbic and others from UM (Ted Moore, Joseph Ansong, Jeroen Ritsema) on the tsunami following the Chicxulub impact.

    Undo
  3. Retweeted
    1 hour ago

    “In the future, everyone will want to be anonymous for fifteen minutes” Acquired from reddit

    Undo
  4. Retweeted
    4 hours ago

    I’m excited for the , because they are so very close to a critical realization after years of “do more!”: When you tell a powerful organization to solve a societal problem, it will grant itself the powers and access to data necessary to do so. Then, it will likely fail.

    Show this thread
    Undo
  5. 4 hours ago

    The thing about Jim Lewis is he's almost always exactly wrong about cyber issues. It's remarkable.

    Undo
  6. 4 hours ago
    Undo
  7. Retweeted
    4 hours ago

    Reading "Battle of Wits" about the history of the Enigma break (and the contribution of Marjan Rejewski and the other Polish mathematicians) one understands why SIGINT agencies traditionally err on the side of data retention.

    Show this thread
    Undo
  8. Retweeted
    7 hours ago
    Replying to

    A wise man told me in 1999: "RE is for suckers who can't steal source code." *Cough*.

    Undo
  9. Retweeted
    6 hours ago

    It doesn't need to be 'fix a bug class'. There are plenty of helpful things that could count as multipliers e.g. Provide LGTM [1] queries to detect the bug, or to do variant analysis. [1]

    Undo
  10. Retweeted
    6 hours ago

    This talk is fascinating. Although it explains a lot about why I find most computer science theory papers to be unreadable.

    Undo
  11. Retweeted
    6 hours ago

    The shadow brokers were wasted on attacking NSA. They should have been poets.

    Undo
  12. Retweeted
    6 hours ago

    Spider language: Despite lacking facial muscles, spiders do have facial expressions. They are easy to read if you know what to look for, as displayed here by Helga the Carolina wolf spider. Helga recently left , but she was one of our most popular spiders.

    Undo
  13. Retweeted
    6 hours ago

    “It’s now becoming increasingly clear that ancient forms of hominins were able to make significant deep-sea crossings.” Why a butchered rhino in the Philippines made my list of most exciting paleoanthropological discoveries of the year:

    Undo
  14. Retweeted
    Dec 27

    "Towards Automated Generation of Exploit Primitives for Web Browsers" - Interesting work by , and 4 guys who have somehow managed to escape having Twitter accounts! ;)

    Undo
  15. 6 hours ago
    Undo
  16. Retweeted
    17 hours ago

    "We can't rule out this is the result of a cyberattack" - at least 10 assholes tomorrow

    Undo
  17. Retweeted
    17 hours ago

    Queens *Electrical Emergency* ConEd facility in Astoria. Bn-49 reports the whole sky light blue, looks like a high voltage emergency at the ConEd facility.

    Undo
  18. Retweeted
    17 hours ago
    Replying to
    Undo
  19. Retweeted

    I'll be on Rachel Maddow show tonight (with filling in) to talk about The NYT investigation published today on how Trump-era rollbacks at EPA & Interior are starting to have real, visible consequences in the US. Here again is the piece

    Undo
  20. Retweeted
    20 hours ago

    Lots of butterflies-especially the subfamily Satyrinae-like to mimic leaves for protection. The camouflage on this specimen is spectacular!

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·