/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Dan Guido

@dguido
26 posts
2025-05-24
Man, sometimes I worry that AI will put me out of business and then I see stuff like this. 💖 https://x.com/...
2025-05-24 View on X
@sleepinyourhat

Anthropic says Opus 4 will use an email tool to “whistleblow” if it detects users doing something “egregiously evil”, like marketing a drug based on faked data

It turns out that Claude 4 Opus (Anthropic) … Ryan Tannenbaum : Claude 4 Opus is designed to take over your computer and contact the cops ... and press ... if it finds you are doin...

2025-05-23
Man, sometimes I worry that AI will put me out of business and then I see stuff like this. 💖 https://x.com/...
2025-05-23 View on X
@sleepinyourhat

Anthropic says Opus 4 will use an email tool to “whistleblow” if it detects users doing something “egregiously evil”, like marketing a drug based on faked data

It turns out that Claude 4 Opus (Anthropic) … Ryan Tannenbaum : Claude 4 Opus is designed to take over your computer and contact the cops ... and press ... if it finds you are doin...

Man, sometimes I worry that AI will put me out of business and then I see stuff like this. 💖 https://x.com/...
2025-05-23 View on X
TechCrunch

Anthropic's System Card: Opus 4 often attempted to blackmail engineers by threatening to reveal sensitive personal info when it was threatened with replacement

Anthropic's newly launched Claude Opus 4 model frequently tries to blackmail developers when they threaten to replace …

2024-08-25
The DOJ is suing Georgia Tech for lying to the DOD about its security practices... after being alerted by whistleblowers from their internal security team! 👀 https://x.com/... [image]
2024-08-25 View on X
The Register

The US DOJ sues Georgia Tech and an affiliate company, alleging failures since at least 2019 to meet the DOD's cybersecurity standards for contract awardees

Rap sheet spells out major no-nos after disgruntled staff blow whistle  —  The US is suing one of its leading research universities …

2024-08-24
The DOJ is suing Georgia Tech for lying to the DOD about its security practices... after being alerted by whistleblowers from their internal security team! 👀 https://x.com/... [image]
2024-08-24 View on X
The Register

The US DOJ sues Georgia Tech and an affiliate company, alleging failures since at least 2019 to meet the DOD's cybersecurity standards for contract awardees

Rap sheet spells out major no-nos after disgruntled staff blow whistle  —  The US is suing one of its leading research universities …

2024-08-16
The vulnerability stems from flawed logic in the verify() method. It checks both ‘payload’ and ‘payload_gzip’ fields, but only one needs to pass verification. An attacker can exploit this by injecting a malicious ‘payload’ while keeping a valid ‘payload_gzip’.
2024-08-16 View on X
Washington Post

Google says it will remove Showcase.apk from Pixel devices “out of an abundance of precaution”, after iVerify said hackers could use the dormant app to spy

'Dangerous' New Spyware Warning Issued Vinayak Guha / Android Authority : Flaw in Verizon Pixel's firmware poses serious security threat (Update: Google statement) Threads: Lauren ...

We identified several on-disk artifacts to help organizations detect if this app is on their devices, including specific files in the app's directory and SQLite databases. It may also modify certain system files.
2024-08-16 View on X
Washington Post

Google says it will remove Showcase.apk from Pixel devices “out of an abundance of precaution”, after iVerify said hackers could use the dormant app to spy

'Dangerous' New Spyware Warning Issued Vinayak Guha / Android Authority : Flaw in Verizon Pixel's firmware poses serious security threat (Update: Google statement) Threads: Lauren ...

Showcase.apk is disabled by default but can be manually enabled. Once active, it downloads a config file over HTTP. @trailofbits discovered the app's signature verification for this config is broken, and malicious configs can be provided.
2024-08-16 View on X
Washington Post

Google says it will remove Showcase.apk from Pixel devices “out of an abundance of precaution”, after iVerify said hackers could use the dormant app to spy

'Dangerous' New Spyware Warning Issued Vinayak Guha / Android Authority : Flaw in Verizon Pixel's firmware poses serious security threat (Update: Google statement) Threads: Lauren ...

.@IsMyPhoneHacked uncovered a hidden Android app “Showcase.apk” pre-installed on Google Pixel phones since 2017. This old Verizon demo app can potentially lead to remote code execution on millions of Android phones. https://x.com/...
2024-08-16 View on X
Washington Post

Google says it will remove Showcase.apk from Pixel devices “out of an abundance of precaution”, after iVerify said hackers could use the dormant app to spy

'Dangerous' New Spyware Warning Issued Vinayak Guha / Android Authority : Flaw in Verizon Pixel's firmware poses serious security threat (Update: Google statement) Threads: Lauren ...

2024-08-15
We identified several on-disk artifacts to help organizations detect if this app is on their devices, including specific files in the app's directory and SQLite databases. It may also modify certain system files.
2024-08-15 View on X
Washington Post

Google says it will remove Showcase.apk from Pixel devices “out of an abundance of precaution”, after iVerify said hackers could use the dormant app to spy

Discovery prompted one intelligence contractor to stop issuing Android phones to employees.

Showcase.apk is disabled by default but can be manually enabled. Once active, it downloads a config file over HTTP. @trailofbits discovered the app's signature verification for this config is broken, and malicious configs can be provided.
2024-08-15 View on X
Washington Post

Google says it will remove Showcase.apk from Pixel devices “out of an abundance of precaution”, after iVerify said hackers could use the dormant app to spy

Discovery prompted one intelligence contractor to stop issuing Android phones to employees.

The vulnerability stems from flawed logic in the verify() method. It checks both ‘payload’ and ‘payload_gzip’ fields, but only one needs to pass verification. An attacker can exploit this by injecting a malicious ‘payload’ while keeping a valid ‘payload_gzip’.
2024-08-15 View on X
Washington Post

Google says it will remove Showcase.apk from Pixel devices “out of an abundance of precaution”, after iVerify said hackers could use the dormant app to spy

Discovery prompted one intelligence contractor to stop issuing Android phones to employees.

.@IsMyPhoneHacked uncovered a hidden Android app “Showcase.apk” pre-installed on Google Pixel phones since 2017. This old Verizon demo app can potentially lead to remote code execution on millions of Android phones. https://x.com/...
2024-08-15 View on X
Washington Post

Google says it will remove Showcase.apk from Pixel devices “out of an abundance of precaution”, after iVerify said hackers could use the dormant app to spy

Discovery prompted one intelligence contractor to stop issuing Android phones to employees.

2024-07-20
Apple deserves a lot of credit today for having the foresight and the willpower to restrict MacOS agents to simpler interfaces. https://developer.apple.com/ ...
2024-07-20 View on X
Wall Street Journal

A profile of CrowdStrike, founded in 2011 and used by 300 companies in the Fortune 500; Gartner: CrowdStrike has ~15% of the global security software market

The little-known company is very popular in Corporate America, contributing to the severity of the global IT outage

Apple deserves a lot of credit today for having the foresight and the willpower to restrict MacOS agents to simpler interfaces. https://developer.apple.com/ ...
2024-07-20 View on X
The Verge

BSODs hit thousands of Windows PCs due to “a defect” in an update from CrowdStrike, taking banks, airlines, and more businesses offline; Microsoft is aware

or CrowdStrike Microsoft : HELPFUL LINKS  —  Get notified of outages that impact you  —  Building reliable applications on Azure The Record : IT teams scramble to recover from Crow...

2024-01-17
In pursuit of speed, many GPU frameworks do not clear GPU local memory after running a kernel. Attackers can recover LLM Q&A by running a kernel on the same GPU. https://twitter.com/...
2024-01-17 View on X
Wired

Researchers describe a GPU vulnerability that allows attackers to exfiltrate data from local memory on some devices with Apple, Qualcomm, AMD, and other chips

Patching every device affected by the LeftoverLocals vulnerability—which includes some iPhones, iPads, and Macs—may prove difficult.

We surveyed the main GPUs available today, but there's a rush of new startups vying for marketshare. How are we assessing the safety of new developments? [image]
2024-01-17 View on X
Wired

Researchers describe a GPU vulnerability that allows attackers to exfiltrate data from local memory on some devices with Apple, Qualcomm, AMD, and other chips

Patching every device affected by the LeftoverLocals vulnerability—which includes some iPhones, iPads, and Macs—may prove difficult.

2022-02-21
In a strange win for transparency, even user-focused phishing attacks are public on the blockchain. Here's the unlucky 19 victims of tonight's attack: https://twitter.com/...
2022-02-21 View on X
CoinDesk

OpenSea says 32 users had NFTs stolen as part of a targeted phishing campaign that scammed them into signing malicious smart contracts

Emails purporting to be from the NFT marketplace about a planned smart contract migration may have been a phishing attack. Source: @dfinzer , @opensea , and @xanderatallah .

2022-02-20
In a strange win for transparency, even user-focused phishing attacks are public on the blockchain. Here's the unlucky 19 victims of tonight's attack: https://twitter.com/...
2022-02-20 View on X
CoinDesk

OpenSea says it's investigating “rumors of an exploit” of smart contracts; CEO says “32 users thus far have signed a malicious payload” and some had NFTs stolen

Emails purporting to be from the NFT marketplace about a planned smart contract migration may have been a phishing attack. Source: @opensea , @dfinzer , and @xanderatallah .

2020-07-23
We should prepare for a future where everyone's DNA is public (e.g., laws against abuse of data). There's little sense in preserving privacy, we're just 1 or 2 hacks away from the data being public forever. https://www.buzzfeednews.com/ ...
2020-07-23 View on X
BuzzFeed News

Hackers attacked GEDmatch servers and caused over 1M of its profiles to be opted-in for searching by law enforcement, which were previously opted-out

First GEDmatch, the DNA database that helped identify the Golden State Killer, was hacked.  Then email addresses from its users were used …