Maciej Pasternacki

@mpasternacki

Sometimes known as Wielki O'Rety // wlkO`Rety@Freenode

Metaverse
Joined December 2008

Tweets

You blocked @mpasternacki

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @mpasternacki

  1. Retweeted
    Aug 23

    script for instantly motivating people to pay your invoice if they've been jerking you around via email. RT to save a freelancer

    Show this thread
    Undo
  2. Retweeted
    Aug 23

    I lost track of speculative execution issues. Is there a maintained summary listing → impact (in/cross-process, kernel mem, VMs) → kind of mitigations (OS, software, microcode) → what OS/compiler versions have the patch → how to turn on/off the mitigations for each of them?

    Undo
  3. Retweeted

    WTF? Procter & Gamble files trademark for 'WTF' 'LOL' 'NBD' and 'FML'

    Undo
  4. Retweeted
    Aug 22

    To anyone in IT who's ever pulled an all nighter because of a crisis, slept at work because that's what it took to respond, or flew to Ghana to retrieve the sole intact instance of your domain controller, RESPECT🙏

    Undo
  5. Retweeted
    Aug 23

    It is disappointing when the "deploy or how to install" section of the docs says "just throw it in a Docker, bro". If it's so fragile to install in normal circumstances maybe it's something to fix. It's like closing door to a room with a broken water pipe.

    Undo
  6. Retweeted
    Aug 19

    People periodically propose encryption backdoors for ticking-bomb scenarios. If they do not detail about how to do key ceremonies in a trustable transparent way with multi-stakeholder control, they don’t understand the problem.

    Show this thread
    Undo
  7. Retweeted
    Jun 22

    Fun fact: During key rotation ceremonies, ICANN has a locksmith ready to drill the locks of the safes holding DNSSEC private keys, if for some reason they won’t open. Physical security’s role is to buy you time in an attack, and draw defender attention. Not to be unbreachable.

    Show this thread
    Undo
  8. Retweeted
    Aug 21

    Matthew Macy has now submitted a Call For Testing of native encryption for 12-CURRENT users! Holy cow!

    Undo
  9. Retweeted
    Aug 14

    Following seven months of responsible disclosure, we are happy to announce that our Foreshadow attack is now public . Work with Mark Silberstein, Daniel Genkin, Frank Piessens

    Show this thread
    Undo
  10. Retweeted
    Aug 8

    This is so good. "They say they've fixed it with something called 'blockchain.'" 😂🤣

    Undo
  11. Retweeted
    Aug 3

    It is official. wireguard vpn is now part of upstream linux kernel and here is what Linus said about it.

    Show this thread
    Undo
  12. Retweeted
    Aug 7

    This reminds me of the time Homebrew updated the SHA of Handbrake withouy bumping the version, to match the malware's signature, rather than heed the security warning.

    Undo
  13. Retweeted
    Aug 7

    Next up in underfunded critical infrastructure: package managers.

    Show this thread
    Undo
  14. Retweeted
    Aug 5

    if i was new and you told me that theres a superhero who's blind and uses echolocation to fight and one who's an adrenaline junkie who flies around using gadgets and that one is called batman and one is called daredevil i would punch you in the face if i found out which was which

    Undo
  15. Retweeted
    Aug 6

    A useful set of intuitions to develop: 1) Why does this business work? 2) What does this business working tell you about the wider world? There's basically nothing in the economy where the answers to these two questions are boring. e.g. secure document destruction services.

    Show this thread
    Undo
  16. Retweeted
    Aug 5

    Just realized that since we read serial nineteenth-century novels only as whole books, we are basically bingewatching the nineteenth century.

    Show this thread
    Undo
  17. Retweeted
    Aug 4

    cs researcher: we need to figure out ways to write safer code with fewer bugs so it can be exploited less often. Hu et. al.: what if *takes a huge bong rip* we added more bugs to the system instead. (this paper is lit)

    Undo
  18. Retweeted
    Aug 3

    ...and imagine if one of them find a new attack vector, only to have it rejected with "That is not mentioned in the user story. Create a new user story, and after triage and story point estimation, it may make it into sprint 27 or maybe sprint 28."

    Undo
  19. Retweeted
    Aug 2
    Replying to

    I wonder if they had user stories for each hack ("as an unauthorized user, I want to...") and daily standup meetings... :)

    Undo
  20. Retweeted
    Aug 2

    “They allegedly used another Atlassian program, Jira, for project management purposes, tracking details of the intrusion, maps of networks, and stolen data.” — Those poor poor bastards.

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·