Tibetans defend against email delivered exploits by moving to the cloud; attackers switch to phishing cloud credshttps://twitter.com/headhntr/status/707965069716430849 …
-
-
Replying to @thegrugq
Exploits are already being phased out by oppressive regimes targeting dissidents, as dissidents develop effective defense strategies.
1 reply 6 retweets 6 likes -
Replying to @thegrugq
As I, and others, have advocated: secure defensible solutions for dissidents are more effective protection than regulation.
1 reply 13 retweets 26 likes -
Replying to @thegrugq
The Wassenaar Arrangement is already becoming obsolete against the evolving threats dissidents actually face.
1 reply 4 retweets 7 likes -
Replying to @thegrugq
If your adversary is not FVEY (generally speaking), your best bet is probably to rely on the Apple/Google security teams to protect you.
2 replies 13 retweets 14 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.