/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Joseph Lorenzo Hall, PhD

@joebeone
5 posts
2026-02-27
Trusting the conference/hotel Wi-Fi because client isolation is enabled? Think again. AirSnitch reveals severe flaws in wireless network implementations, bypassing protections to enable practical machine-in-the-middle attacks on other clients' traffic. https://www.ndss-symposium.org/ ...
2026-02-27 View on X
Ars Technica

Security researchers detail AirSnitch, a series of attacks that bypass Wi-Fi client isolation, enabling machine-in-the-middle attacks in modern Wi-Fi networks

That guest network you set up for your neighbors may not be as secure as you think.  —  It's hard to overstate the role that Wi-Fi plays in virtually every facet of life.

2024-12-04
Ahem, [taps the end-to-end encryption sign] “U.S. officials urge Americans to use encrypted apps amid cyberattack that exposed live phone calls” https://www.nbcnews.com/...
2024-12-04 View on X
NBC News

Amid the Salt Typhoon hacks, US officials recommend that Americans use encrypted messaging apps to ensure their communications stay hidden from foreign hackers

Stop Sending Texts Jonny Evans / Computerworld : The FBI now says encryption is good for you  —  Apple has been battling to maintain encryption for a decade. Cynthia B Brumfield / ...

2023-05-18
For app stores to geofence downloads to only “not-Montana” Is going to require they collect more fine-grained location than they currently do (via geoIP, registered address). That will be a honeypot of precise location data for malicious or government use https://twitter.com/...
2023-05-18 View on X
Wall Street Journal

Montana Governor Greg Gianforte signs the country's first bill that bans TikTok in a state, set to go into effect on January 1, 2024

Ban is slated to take effect next year—if it survives expected litigation  —  Montana's governor signed the country's first bill that outright bans TikTok …

2019-09-29
“We strongly urge all journalists, activists, and politicians to upgrade to an iPhone that was released in the past two years with an A12 or higher CPU.” https://blog.trailofbits.com/ ...
2019-09-29 View on X
ZDNet

Researcher claims he found “a permanent unpatchable bootrom exploit” for iOS devices with A5 to A11 chips, enabling jailbreaks for iPhone 4S to X, releases code

New jailbreak will work on iPhones 4S up to iPhone 8 and X.  —  A security researcher has released today …

“We strongly urge all journalists, activists, and politicians to upgrade to an iPhone that was released in the past two years with an A12 or higher CPU.” https://blog.trailofbits.com/ ...
2019-09-29 View on X
Ars Technica

Checkm8 creator says his iPhone exploit requires physical device access and lacks persistence after reboot, but will make jailbreaking more accessible and safer

Unpatchable vulnerability is a game-changer that even Apple will be unable to stop.  —  Often, when new iOS jailbreaks become public, the event is bitter-sweet.