Lukasz Olejnik

@lukOlejnik

Security & Privacy. Data protection. Research. Engineering. Strategy. Analyst. Policy. W3C/IE. Consultant (perhaps happy to do interesting work for you?)

Brussels / London / EU
Vrijeme pridruživanja: ožujak 2013.

Tweetovi

Blokirali ste korisnika/cu @lukOlejnik

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @lukOlejnik

  1. Prikvačeni tweet
    29. svi 2019.

    My analysis of report selection. Cyberoperations. What impacts on exploit cost? Why supply chain attacks are a risk? Targeting health care (lethal cyberattacks; can you even detect?), ICS. Armed conflict context. How to move forward?

    Prikaži ovu nit
    Poništi
  2. prije 22 sata

    Could/should article 42 (7) of the Treaty on European Union be activated in practice in an event of a country falling to a cyberattack? If not, why not? If yes, what intensity?

    Poništi
  3. proslijedio/la je Tweet
    28. velj 2019.

    My op-ed in on Do Not Track browser setting. Yes, it does nothing; needed regulatory backing. But now it's on the table in Europe regulation. High stakes and opportunity to fix consent management.

    Poništi
  4. 2. velj

    Privacy catastrophe lead to £1.1bn loss of company market value (). This could have been predicted with a sound privacy impact assessment ().

    Poništi
  5. proslijedio/la je Tweet
    23. sij

    My analysis of privacy/security vulnerability in Intelligent Tracking Prevention. Such bugs in privacy-enhancing features are highly counter-intuitive. Very interesting privacy engineering case study! I post some details.

    Poništi
  6. proslijedio/la je Tweet
    14. sij

    If you'd like to read more about my research into fingerprinting/leaks via Battery API:

    Poništi
  7. proslijedio/la je Tweet
    14. sij

    On the official site describing planned Chrome's privacy upgrade, privacy leaks via Battery API (my bug report linked) explicitly mentioned. Thanks, ;-)

    Poništi
  8. 1. velj

    Remember situations of some "random people with big audiences" keep saying that natural events happened due to a cyberattack? Similar happened to . Now some guys allege bioweapons-like marks (), and others debunk it ()

    Poništi
  9. 1. velj

    Drones in China search people not wearing masks, tnen turn on the microphone to remind about this duty.

    Prikaži ovu nit
    Poništi
  10. 31. sij

    Less obvious outcome of is that now EU data protection authorities can grant large fines for breaches, and the UK data protection authority can do the same. For same breaches, to same recipient.

    Poništi
  11. 31. sij

    Avast is concerned with Iranian cyberattacks on USA. But it seems cybersecurity vendors exploiting private data of users, are much more realistic concerns.

    Poništi
  12. proslijedio/la je Tweet
    31. sij

    New attempt in the US to regulate technology: bindingly tell them not to use "reckless" techniques (might it mean strong encryption?). Europe will need to ask itself a question: strong security, privacy and data protection?

    Poništi
  13. 31. sij

    New attempt in the US to regulate technology: bindingly tell them not to use "reckless" techniques (might it mean strong encryption?). Europe will need to ask itself a question: strong security, privacy and data protection?

    Poništi
  14. 30. sij

    Today most use mass consumer devices. After reports of advanced hacking tools targeted at VIPs, premium 'personal cybersecurity' products gain popularity. Oh these do exist. The trick is to find the honest and quality ones. Watch out who you trust?

    Poništi
  15. proslijedio/la je Tweet
    27. pro 2019.

    I analyse Ireland's cybersecurity strategy. Ireland observes the return of "great power politics", and Ireland as Europe's point of digital vulnerability. If so, does the strategy deliver?

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    29. sij

    Geneva is a special place but you might still suspect of some placements being off-limits. That said - speaking from experience now - the most crazy and exploitable stuff with respect to cybersec vulnerabilities, I saw at international orgs. I did not see such stuff anywhere else

    Poništi
  17. proslijedio/la je Tweet
    29. svi 2019.

    My analysis of report selection. Cyberoperations. What impacts on exploit cost? Why supply chain attacks are a risk? Targeting health care (lethal cyberattacks; can you even detect?), ICS. Armed conflict context. How to move forward?

    Prikaži ovu nit
    Poništi
  18. 29. sij

    Geneva is a special place but you might still suspect of some placements being off-limits. That said - speaking from experience now - the most crazy and exploitable stuff with respect to cybersec vulnerabilities, I saw at international orgs. I did not see such stuff anywhere else

    Poništi
  19. 29. sij

    Systems of United Nations office in Geneva hacked last year. Lots of significant data could be affected. International orgs are not bound by the usual cybersecurity and privacy standards, nor transparency. Diplomatic immunity sometimes insufficient.

    Poništi
  20. 29. sij

    The independent Russian TV Dozhd is a victim of sustained multi-week DDoS attacks (), same for Echo of Moscow radio station ()

    Poništi
  21. 29. sij

    UK designated ZTE as a high risk vendor (risk not possible to mitigate), and assesses that backdoors in Huawei are a low risk.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·