Tweets

You blocked @LeConteSpink

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @LeConteSpink

  1. Pinned Tweet
    Nov 20

    Dwain Weston & I did the BASE jump of Monkey Face back in the day - exitpoint is on the left-hand skyline of this photo, accessed via an aid line to the cave mouth (visible in pic) & a scramble to the summit from there - neat jump, very aesthetic. Still miss you, Dwain. R.I.P.

    This media may contain sensitive material. Learn more
    Show this thread
    Undo
  2. Retweeted
    Nov 28
    Undo
  3. Retweeted
    16 hours ago

    The problem with this statement is that there are very few activities that law enforcement does that should be considered legitimate, and that the power structures we enable to support the "legitimate" activities end up supporting the oppression of marginalized communities.

    Show this thread
    Undo
  4. Retweeted
    13 hours ago
    Undo
  5. Retweeted
    16 hours ago

    Sealed sender is currently rolling out in production and already represents 45% of overall Signal messaging traffic. That percentage is growing fast as users update. Thanks to everyone who participated in the public beta.

    Undo
  6. Retweeted
    Nov 26

    Tsurugi is an heavily customized Linux distribution designed to support your DFIR investigations, malware analysis and open source intelligence activities

    Undo
  7. Retweeted

    Please continue to write to Jeremy. (Please only letters at this time - no books or magazines.) He will continue to be housed in solitary for the time being, so mail is vital to keep his spirits up! Jeremy Hammond, #18729-424 FCI Milan P.O. Box 1000 Milan, MI 48160

    Show this thread
    Undo
  8. Retweeted
    11 hours ago

    Briar has no service provider and only you know who's who.

    Undo
  9. 14 hours ago
    This media may contain sensitive material. Learn more
    Show this thread
    Undo
  10. 14 hours ago

    Twitter has figured out I have cancer (via my tweets, so fair enough) & now feeds me promoted oncology-related adverts. I read some of them, because they're relevant & often technically substantive. Even so, yeah... it's undeniably creepy. This is the future we worked to build?

    Show this thread
    Undo
  11. Retweeted
    15 hours ago

    Source of these screenies relating to 3ve fraudnet BGP hijacking (.pdf, ironically enough ;-): (cc )

    Show this thread
    Undo
  12. Retweeted
    15 hours ago

    This fraud campaign has been using, for years, BGP hijacking at scale in order to push traffic to infection sources... wow.

    Show this thread
    Undo
  13. Retweeted
    19 hours ago

    How to create the perfect anonymizing botnet by abusing UPnP features — and without any infection

    Show this thread
    Undo
  14. Retweeted
    19 hours ago

    【=🌀︿🌀=】a little visual for my porter remix made by my touring partner, friend & visuals guy, Cam.

    Undo
  15. Retweeted
    18 hours ago

    This is a very, very important red flag for anyone working on civilian digital security technologies. If we aren't directly & effectively defending against such attacks, then we might as well just ship data around plaintext. Assuming this isn't happening already would be naive.

    Undo
  16. Retweeted
    Nov 28

    A short paper shedding light onto the brand new ELF binary mitigation feature 'SCOP' (Secure code partitioning) introduced into the latest versions of gcc/ld. Discovered and analyzed by Justin Michael's and myself on a Saturday evening::

    Show this thread
    Undo
  17. Retweeted
    17 hours ago

    This. Looking back on today's network security landscape from n years in future (n being a low single-digit real number), we'll be baffled as to how/why this attack model was so widely & blithely ignored for so long. Alas self-delusion != viable security methodology.

    Undo
  18. Retweeted
    19 hours ago
    Replying to

    Quite a gaping loophole (the third one) the GCHQ has built into their equities process, eh? In a very real sense, *all* software - particularly anything network-facing - is "inherently vulnerable." (cc )

    Undo
  19. 21 hours ago

    "If that weren’t enough, there is another way to steal computing resources through a webpage-embedded mining script that starts when the user opens the site in a browser." Now *who* would be dumb enough to do that..? 🤔 Oh wait. Right. 👍

    Undo
  20. Retweeted
    Nov 28

    xsshell : An XSS reverse shell framework :

    Undo
  21. Retweeted
    Nov 28
    This media may contain sensitive material. Learn more
    A Far Side comic. Two steer are drawing a diagram of a farmer divided into pieces of meat, a few labeled "Shoulder Chops" and "Spare Ribs", and the head marked "throw away". The caption of the comic is "Farmer Brown froze in his tracks; the cows stared wide-eyed back at him. Somewhere, off in the distance, a dog barked."
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.