/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@da_667

@da_667
17 posts
2022-09-17
The amount of shitposting and emojis is pretty hilarious. https://twitter.com/...
2022-09-17 View on X
Washington Post

Uber's hacker, who claims to be 18 years old, says he hacked Uber for fun, using social engineering, might leak source code, and has access to its AWS account

Washington Post :

The amount of shitposting and emojis is pretty hilarious. https://twitter.com/...
2022-09-17 View on X
The Verge

Uber says there is “no evidence” the hacker accessed sensitive user info, like trip histories, during the breach and that all its products are now “operational”

Uber says there is “no evidence” that any of its users' private information was compromised in a breach of its internal computer systems.

2022-09-16
The amount of shitposting and emojis is pretty hilarious. https://twitter.com/...
2022-09-16 View on X
Washington Post

Uber hacker, who claims to be 18 years old, says he hacked Uber for fun, using social engineering, might leak source code, and has access to Uber's AWS account

The company said in a tweet it was “responding to a cybersecurity incident”  —  SAN FRANCISCO — Uber's computer systems …

The amount of shitposting and emojis is pretty hilarious. https://twitter.com/...
2022-09-16 View on X
New York Times

Uber takes some internal systems offline to investigate a network breach; Yuga Labs' Sam Curry says it appears the hacker pretty much has “full access to Uber”

The company said on Thursday that it was looking into the scope of the apparent hack.

2022-09-14
You want to know how I could believe they don't have a dev env? - First off, Mudge isn't an idiot. Good rep goes a long way. - Second, how long has the unfollow bug been a thing? How long have we gotten random twitter outages that couldn't be pinned down?
2022-09-14 View on X
TechCrunch

Mudge details Twitter's lack of logging, ignoring hackers' ongoing efforts to access its systems, how the FTC let the company “grade its own homework”, and more

A ticking bomb of security vulnerabilities.  Covering up security failures.  Duping regulators and misleading lawmakers.

You want to know how I could believe they don't have a dev env? - First off, Mudge isn't an idiot. Good rep goes a long way. - Second, how long has the unfollow bug been a thing? How long have we gotten random twitter outages that couldn't be pinned down?
2022-09-14 View on X
New Yorker

A look at the efforts by at least six research groups to find dirt on Twitter whistleblower Peiter Zatko, including offers to pay his former colleagues for info

2022-01-22
Would've loved to have been a fly on the wall to see how this all went down. Wonder of Mudge lost his shit and said NFTs are fucking stupid, and the CEO took it personally because of his monke.svg collection. https://twitter.com/...
2022-01-22 View on X
New York Times

Twitter terminated its head of security Peiter “Mudge” Zatko this week, and CISO Rinki Sethi will depart in the coming weeks; both execs joined Twitter in 2020

Market summary: 📊  —  Brutal week in the market finally ends. Steve Zurier / scmagazine.com : What's it mean? Making sense of Twitter's decision to oust ‘Mudge’ Zatko and Rinki Set...

2021-10-12
Okay, we're gonna learn a bit tonight. I'm going to thread a bunch of tweets together. Let me preface this with: I'm not a backbone network engineer, and DDOS mitigation was never my day job. So let's learn together, eh? https://twitter.com/...
2021-10-12 View on X
The Record

Microsoft says it mitigated a 2.4Tbps DDoS attack on an Azure customer at the end of August, breaking AWS' record of mitigating a 2.3Tbps attack in Feb. 2020

Microsoft said its Azure cloud service mitigated a 2.4 terabytes per second (Tbps) distributed denial of service attack this year … Source: Azure Cloud Computing Services .

2020-12-23
ah yes, because playing fast and loose with tons of hardware hurtling down the freeway is exactly what I want. https://twitter.com/...
2020-12-23 View on X
Reuters

Sources: Apple is planning to manufacture a car by 2024 which may include self-driving tech, internally developed lidar sensors, and “breakthrough” battery tech

2020-12-22
ah yes, because playing fast and loose with tons of hardware hurtling down the freeway is exactly what I want. https://twitter.com/...
2020-12-22 View on X
Reuters

Sources: Apple is planning to manufacture a car by 2024 which may include self-driving tech, internally developed lidar sensors, and “breakthrough” battery tech

(Reuters) - Apple Inc is moving forward with self-driving car technology and is targeting 2024 to produce …

2020-12-09
“Similar to ESNI, the protocol uses a public key, distributed via DNS and obtained using DoH” So its another protocol that consolidates power and centralizes control to cloudflare. https://blog.cloudflare.com/ ...
2020-12-09 View on X
TechCrunch

Cloudflare and Apple say they have developed a new protocol called Oblivious DNS-over-HTTPS, which decouples DNS queries from internet users for more privacy

Zack Whittaker / TechCrunch :

2020-06-03
This is what's known as ‘flushing good will down the toiler the minute you have marketshare’. Also known as ‘the google method’ https://twitter.com/...
2020-06-03 View on X
The Next Web

Zoom CEO says the app's upcoming end-to-end encryption feature will be available only to paid users in order to comply with law enforcement in case of misuse

If you're a free Zoom user, and waiting for the company to roll out end-to-end encryption for better protection of your calls, you're out of luck.

2019-09-01
the iOS 0-day/implant that google TAG found just really goes to show you why there is such a big market for iOS 0-days. With the right exposure, its intelligence goldmine that reaps massive dividends.
2019-09-01 View on X
Project Zero

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

In the earlier posts we examined … Ian Beer / Project Zero : In-the-wild iOS Exploit Chain 1 Patrick Howell O'Neill / MIT Technology Review : Websites have been quietly hacking iPh...

the iOS 0-day/implant that google TAG found just really goes to show you why there is such a big market for iOS 0-days. With the right exposure, its intelligence goldmine that reaps massive dividends.
2019-09-01 View on X
TechCrunch

Sources: a number of recently disclosed malicious websites used to hack into iPhones over a two-year period were designed to target Uyghur Muslims in China

A number of malicious websites used to hack into iPhones over a two-year period were targeting Uyghur Muslims, TechCrunch has learned.

2019-08-31
the iOS 0-day/implant that google TAG found just really goes to show you why there is such a big market for iOS 0-days. With the right exposure, its intelligence goldmine that reaps massive dividends.
2019-08-31 View on X
Wired

For two years, a handful of websites hacked thousands of iPhones that visited them, getting access to live location data, photos, contacts, and even passwords

For two years, a handful of websites have indiscriminately hacked thousands of iPhones.  —  Hacking the iPhone has long …

the iOS 0-day/implant that google TAG found just really goes to show you why there is such a big market for iOS 0-days. With the right exposure, its intelligence goldmine that reaps massive dividends.
2019-08-31 View on X
Project Zero

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

In the earlier posts we examined … Ryan Whitwam / ExtremeTech : Google Discovered Malicious Websites Used to Hack iPhones for Years Jon Porter / The Verge : Google reveals major iP...

2019-08-30
the iOS 0-day/implant that google TAG found just really goes to show you why there is such a big market for iOS 0-days. With the right exposure, its intelligence goldmine that reaps massive dividends.
2019-08-30 View on X
Project Zero

An in-depth look at five iOS exploit chains that were used in hacked websites for carrying out watering hole attacks against devices running iOS 10 through 12

Project Zero's mission is to make 0-day hard.  We often work with other companies to find and report security vulnerabilities …