Phil Ames

@philames

Information security professional. Tweets/opinions are my own.

Vrijeme pridruživanja: svibanj 2009.

Tweetovi

Blokirali ste korisnika/cu @philames

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @philames

  1. proslijedio/la je Tweet
    30. sij

    Google OpenSK is an open-source security key that supports FIDO and U2F:

    Poništi
  2. proslijedio/la je Tweet
    22. sij

    Earlier today we published the details of a set of vulnerabilities in Safari's Intelligent Tracking Prevention privacy mechanism: . They are... interesting. [1/9]

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    20. sij

    A photography technique I invented: take a series of time lapse photos, colour each one with a different hue using colours from the spectrum of light, then recombine them. The colour of each pixel depends on how its brightness changed over time.

    Prikaži ovu nit
    Poništi
  4. 21. sij
    Poništi
  5. 20. sij

    Looks like a cool series of exercises on implementing an OS in Rust.

    Poništi
  6. proslijedio/la je Tweet
    Odgovor korisniku/ci
    kjones@Kevins-MacBook runtime % git whoami
git: 'whoami' is not a git command. See 'git --help'.
kjones@Kevins-MacBook runtime % git config --global alias.whoami 'config user.email'
kjones@Kevins-MacBook runtime % git whoami
kevin@vcsjones.com
kjones@Kevins-MacBook runtime %
    Poništi
  7. 18. sij
    Poništi
  8. proslijedio/la je Tweet
    12. sij

    The FCC tracked down a 50mW wireless network 47 miles away after it was interfering with a weather radar. Amazing.

    Poništi
  9. proslijedio/la je Tweet
    18. pro 2019.

    Microsoft Research came up with an A.I. model to predict the number of bugs in a code base and the top predictors in order of accuracy were - company org structure - code churn - code complexity - dependencies - code coverage Anyone else not surprised?

    Poništi
  10. proslijedio/la je Tweet
    7. sij

    Because the Linux Auditing System is boring but useful, I learned all about it so you don’t have to! The goal of this post is to give a neutral overview of how it works, what to consider before implementing it, and the strengths and weaknesses of AuditD

    Poništi
  11. 5. sij

    Learned more about shipping containers from this thread than season 2 of The Wire

    Poništi
  12. proslijedio/la je Tweet
    28. pro 2019.

    I struck on gold. Probably the best sticker in

    Poništi
  13. proslijedio/la je Tweet
    19. pro 2019.

    Apple renamed iOS Security Guide to Apple Platform Security Guide, and a new version has just been published. There is a lot of new content, and the PDF is now 157 pages long (up from 94). This is a must-read. PDF: Web:

    Poništi
  14. proslijedio/la je Tweet
    23. pro 2019.

    Ever wondered what makes a CTF challenge good? I've asked myself that many times. I wrote this to help me answer that question based on discussions with others in the community

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    21. pro 2019.

    Here is what fraudsters really are doing and have been for years: credential stuffing. It’s boring, unsexy, but it’s like printing money. They get access to someone’s email account, search for emails from services they can turn access to into money, then do that.

    Prikaži ovu nit
    Poništi
  16. 20. pro 2019.

    And here we all thought we were "done" with time problems until 2038.

    Poništi
  17. proslijedio/la je Tweet
    20. pro 2019.

    "Linux 5.3 will turn back getrandom() into /dev/urandom with its never-blocking behavior" Wait, what? Was getrandom crippled without me noticing? I can find an LWN thread but nothing definitive.

    Poništi
  18. proslijedio/la je Tweet
    3. pro 2019.

    Dentist: "Have you been flossing?" Me: .......... Dentist: .......... Me: "Do you ensure all of your web account passwords are unique, especially for things like bank websites?" Dentist: .......... Me: .......... Dentist: "So, see you in 6 months?" Me: "Sure"

    Poništi
  19. proslijedio/la je Tweet
    12. pro 2019.

    The TOC and sample chapters are posted for the . Sample chapters: * "What is software engineering?" - The thesis * Build Systems - How to think about builds, caching, reproducibility, etc * Large Scale Changes - How to refactor The World

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    5. pro 2019.

    OpenSSL CVE-2019-1551: Incorrect consttime modular exponentation, found after 1.5 years of bignum fuzzing at OSS-Fuzz

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·