Ryan HurstOvjeren akaunt

@rmhrisk

I build things. Security, Cryptography, Transparency, Software, Engineering, Entrepreneurship. [ex MSFT, Globalsign, 21co; now Google + advisor Let's Encrypt]

Vrijeme pridruživanja: siječanj 2009.

Tweetovi

Blokirali ste korisnika/cu @rmhrisk

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rmhrisk

  1. Prikvačeni tweet
    3. ožu 2018.

    Trust is a necessary component of human existence. It can give us peace of mind but It can also give us broken hearts. The same is true in the context of system design. Trust cautiously.

    Poništi
  2. proslijedio/la je Tweet
    prije 6 sati

    Spend 10 minutes reading this presentation from if you're at all at all interested in "tech", regulation or the future. Fascinating start to the day.

    Poništi
  3. Ragnarok on Netflix was pretty good.

    Poništi
  4. proslijedio/la je Tweet

    Telegram founder rails into WhatsApp, with a well documented, well-linked summary of WhatsApp vulnerabilities.

    Poništi
  5. proslijedio/la je Tweet
    prije 21 sat

    Enigma machines ! At the Spy Museum, in Berlin. Tons of cool artifacts. Let's pretend I'm 12 for the next couple hours...

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    prije 17 sati

    The 1B+ users club: • Apple: 1.5B devices • Google: 2.5B Android devices; 1B+ on Search, Gmail, Drive, Maps, YouTube, Chrome, Photos • Facebook: 2.89B users on FB, Instagram, WhatsApp, Messenger • Microsoft: 1.5B Windows devices, 1.2B Office users • Tencent: 1B WeChat users

    Prikaži ovu nit
    Poništi
  7. 140 year old security technology

    Prikaži ovu nit
    Poništi
  8. Smaller of the two safes being restored has marks indicating elements of the design were patented in 1873. While this doesn’t give a manufacturer date it does roughly place it. It seems this is likely from 1880 or earlier based on what we know so far.

    Prikaži ovu nit
    Poništi
  9. 1. velj

    Having a puppy, and kids makes me feel like I am a member of Baja Men —- Who let the dogs out?

    Poništi
  10. proslijedio/la je Tweet

    This week coming up, How many hours are you putting into hiring for the top gap on your org chart? > 10?

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    Why do I keep retweeting my election security reading list? Because we urgently need more technologists to engage with and develop expertise in this area, and these papers are an efficient way to get a start at that.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    17. sij
    Prikaži ovu nit
    Poništi
  13. 1. velj

    Where you decide yo place a company/office has a massive impact on your ability recruit. Conversely being able to structure things so you can support and be effective with remote employees can be a competitive tool, especially in growth phases.

    Poništi
  14. proslijedio/la je Tweet

    Zinc: a Rust-like DSL for creating zero-knowledge proof circuits

    Poništi
  15. proslijedio/la je Tweet
    1. velj

    This is technically still allowable according to Trezor's specified threat model (protection against remote threats, including a fully hostile host PC). Problem is that isn't the intuitive threat model their users expect, IMO.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    31. sij
    Odgovor korisnicima

    US: You can’t use Huawei technology for anything, the Chinese government may have a backdoor to access your encrypted data Also US: American tech companies, we need a backdoor in your product to access encrypted communications of your users

    Poništi
  17. proslijedio/la je Tweet
    31. sij

    12. The commission has to consider privacy and security. But that consideration is all they’re required to do. And even if they do recommend encryption: the AG can just override whatever they decide. And those problems are the tip of the iceberg.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    31. sij

    I retweeted this post yesterday, but I urge people who care about encryption online to read it, because this legislation should scare you. I am going to follow with a (much less thorough and accurate) summary thread below.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    30. sij

    Severe ‘Perfect 10.0’ Microsoft Flaw Confirmed: ‘This Is A Cloud Security Nightmare’ “We can break the isolation of Azure’s functions—now I can see everybody else’s functions. Anyone using Azure will be impacted—that means millions of users.”

    Poništi
  20. proslijedio/la je Tweet

    Unemployment got boring. I'm joining . More:

    Poništi
  21. proslijedio/la je Tweet
    30. sij

    Google OpenSK is an open-source security key that supports FIDO and U2F:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·