Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @merry
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @merry
-
Keybase users, if you need to restrict contact from accounts you don’t follow
, you can do so with this week’s release.
Go to Settings > Chat > Contact restrictions.https://twitter.com/acousmatique/status/1223001736534724610 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Merry Ember Mou proslijedio/la je Tweet
Google loves security keys, and today announced an open source implementation to help spur further innovation from the security research community 1/ https://security.googleblog.com/2020/01/say-hello-to-opensk-fully-open-source.html ….
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
the above phrase being a quote from https://www.bbc.com/news/blogs-trending-31141256 …. "When a jury convicted Sterling of espionage, the smoking gun wasn't a key bit of classified information found in the former CIA officer's possession; it was a trail of phone calls and emails of unknown content."
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
awesome work in alpha by
@SecureDrop replacing operationally-cumbersome airgapped computer setup with a@QubesOS-based workflow: https://github.com/freedomofpress/securedrop-workstation …#enigma2020Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
lea presents some tactics for how to build *respectful* systems: option 1) help your company understand and prioritize respect. 2) build better where you are, design for flexibility. 3) vote with your feet
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
“our community tends to prioritize purity [of security and privacy design]”... that may not actually serve our users
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
.
@LeaKissner on threat modeling for humans: you need to consider vulnerability factors, attacker factors, system areas...#enigma2020pic.twitter.com/NJnxA7HkAc
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
this one’s pretty cute but not very cuddly :( which is a requirement for cuddlefishpic.twitter.com/7E5rZ4qcjl
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
this reminds me of a couple weeks ago looking for a kubectlfish mascot for the home kubernetes cluster and finding options like https://twitter.com/mjg59/status/1214132556460748801 …pic.twitter.com/jYmbyiLRfI
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
stats so far from browser extension telemetry: - 1.5% logins in the web are breached - "highly actionable" is a design priority, but only 26% acted on browser extension notice... - good news is that 94% of new changed passwords are as strong or stronger than original password!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crypto code in https://github.com/google/private-join-and-compute … also see chromium repo
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
neat protocol: uses an OPRF to do a "private set intersection" - determine if a user's (client-blinded) (username, password) is present in the returned set of (server-blinded) rows. db rows are sharded by b-bit hash prefix of username.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#realworldcrypto talk about Google Password Checkup: credential stuffing is a big problem - "hackers account for 90% of login attempts at online retailers"Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
design considerations: - people don’t want to lose message history - multi-device support - people want web client, which has additional security concerns - notification behaviors “privacy is a fundamental human right”, “we are going to ship this”
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
talk on e2e encryption of Facebook messenger at
#realworldcrypto, e2ee = privacy of data in transit. we also want privacy of data (and derived data) at rest, e.g. in logs, crash reports, notificationspic.twitter.com/gu7t3gSHaB
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
now if only there were a paper and implementation!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
adept secret sharing properties: - privacy - authenticity/binding (a commitment) - error correction (recovery) also secret sharing is a lot like symmetric encryption, e.g. we want associated data (tagging), parameters for encryption scheme...https://twitter.com/durumcrustulum/status/1215317714719399936 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
