Hackerman boosted

I'm updating a 2017 story on how to secure your phone for a protest. If anyone has any suggestions, I am all ears.

Hackerman boosted

Let's talk about electromagnetic interference and trunked radio systems, often used by police, fire, and EMS. Unfortunately, some of these systems have critical flaws.

No particular reason to be talking about this now, of course, but I'm bored.

Hackerman boosted
Hackerman boosted

People need to be careful that rolling release won't become stumbling release.

Hackerman boosted

"You know better than to trust a strange computer"

C3PO speaking infosec truth!

Hackerman boosted

i'm no psychologist but everyone i know is lowkey surpressing the urge to tear up every piece of paperwork in their house and smash most of their electronic devices and run away into the night and the woods for as long as they possibly can and i /do/ think that's a problem

Hackerman boosted

> normally this [what we've done] would be referred to as 'sheer luck', however, in my field we call this 'heuristics'

🤣

Hackerman boosted

The annoying thing about information security is that it tends to imply the conclusion that knowledge leads to insanity.

#1: by reading information from the Internet you send information to the Internet. So whatever you try to know, knows you back.

#2: caching information locally to prevent #1 can cause timing attacks

#3: there is no functional programming because every read is a side effect (#1, #2)

#3: preserving your identity requires secrecy, which requires destroying your own knowledge

Hackerman boosted
Hackerman boosted
Hackerman boosted

Proposal: Change the abbreviation for "man-in-the-middle" to MIMTM. What's the extra M for? It's the man in the middle.

Hackerman boosted

You, a coward: Python doesn't have a switch statement

Me, a modern-day Galileo:

Hackerman boosted

The year is 2040. It has been the year of the seL4 desktop, and everyone uses coreboot on RISC-V processors. Nobody knows how to securely isolate OpenGL programs running on the same GPU from each other by virtualization yet.

Hackerman boosted

Anyone that needs a sysadmin/security engineer?

Anyone?

Please.

Hackerman boosted
Hackerman boosted

If Python is so good, then how come there's still Python 2?

Hackerman boosted

posts generated by a Markov chain trained on the King James Bible, Structure and Interpretation of Computer Programs, and some of Eric S. Raymond's writings

Hackerman boosted

Me: "doctor what's wrong with me"
Dr: "you are a huge nerd"
Me: "oh no"
Dr: "there is no cure"

Hackerman boosted

NOW SILENTLY SCRAPING THE FEDIVERSE
BRRRRRRRRRRR
CURRENTLY BEHIND:
7
PROXIES

CURRENTLY ARCHIVING
OVER NINE THOUSAND
POSTS PER SECOND

BRRRRRRRRRRRRR

Hackerman boosted

golang memes 

the virgin c: "you need to build [long list of stuff] and if you wanna enable multiple targets you might be here for a few hours"
the chad go: "we do a 4-phase bootstrap and support all the targets. it takes about a minute on toast's cpu"
Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.