/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Martijn Grooten

@martijn_grooten
31 posts
2022-11-07
The people running Twitter right now are all men and all based in America https://www.washingtonpost.com/ ...
2022-11-07 View on X
Washington Post

A profile of Alex Spiro, a celebrity lawyer and central figure in Elon Musk's bid to overhaul Twitter, who has done much of the legal heavy lifting so far

Washington Post :

2022-08-09
This is a good article on Russia re-routing the Internet in parts of Ukraine they have occupied to force traffic through networks they control, which allows them to block services like Google and YouTube https://www.nytimes.com/...
2022-08-09 View on X
New York Times

Russia has been rerouting internet traffic in occupied Ukrainian territories through domestic networks since June, blocking uncensored information and services

New York Times :

2022-02-23
I have many feelings about stalkerware, aside from being used to cause real harm, also being a terrible mess security-wise. Good reporting by Zack — and do note the removal guide he created should you need it https://twitter.com/...
2022-02-23 View on X
TechCrunch

A look at nine Android spyware apps, installed on ~400K phones, which connect to servers controlled by Vietnam-based 1Byte and share a critical security flaw

A fleet of spyware apps share the same security flaw  —  Much of the spyware you hear of today are the powerful nation-state backed exploits …

2022-02-10
I work with some people in Portugal. This is still going on and it's big. Large numbers of people can't use the Internet, make calls or watch TV. https://twitter.com/...
2022-02-10 View on X
Ars Technica

Vodafone Portugal is working to recover from a “deliberate and malicious cyberattack” that also affected businesses, ambulances, fire departments, and hospitals

Ambulance and emergency services are among those suffering from “deliberate” hack.

2021-11-11
Hacker-for-hire groups aren't getting the attention their actions deserve. Their targets often include civil society and this case is no exception. Important work by @FeikeHacquebord and good write-up by Tom. https://twitter.com/...
2021-11-11 View on X
Forbes

Researcher details how hacker-for-hire group RocketHack infiltrated the email and Telegram accounts of ~3,500 individuals, including politicians and journalists

An unprecedented peek inside an underground hacker-for-hire operation reveals 3,500 targets, including Belarusian presidential candidates … Tweets: @rondeibert , @iblametom , and @...

2021-07-28
This sounds like a really bad idea. https://twitter.com/...
2021-07-28 View on X
Wired

Creators of PunkSpider say they're relaunching their search engine for hackable sites at Defcon next week to spur web admins to fix thousands of unpatched bugs

in the hope of shaming site owners into fixing them. https://www.wired.com/... Thomas Brewster / @iblametom : PunkSpider was super interesting when it first launched but was plague...

2021-06-14
This post by Facebook whistleblower Sophie Zhang on bot farms of self-compromised accounts that mostly operate in the Global South is worth reading https://restofworld.org/...
2021-06-14 View on X
Rest of World

Many Latin American Facebook users are self-compromising their accounts to fuel fake engagement through “autoliker” websites and unwittingly joining bot farms

2021-04-21
What Paul says, but also: if your org runs _any_ kind of remote access/VPN solution, make sure you are set up to a) receive security alerts as soon as they are published and b) apply relevant patches or mitigations immediately. https://twitter.com/...
2021-04-21 View on X
Reuters

FireEye and networking company Pulse Secure say two China-linked hacking groups used a flaw in its VPN devices to target customers in the US defense industry

Exploitation of Pulse Connect Secure Vulnerabilities  —  Summary Department of Homeland Security : Emergency Directive 21-03  —  Mitigate Pulse Secure Product Vulnerabilities CNN :...

2021-04-07
This is a good thread on why Signal adding integration for a cryptocurrency sounds like a pretty bad idea. Some more details (and quotes from some more concerned people) at Wired https://www.wired.com/... https://twitter.com/...
2021-04-07 View on X
Wired

Signal says it has added support for privacy-focused cryptocurrency MobileCoin to let users send and receive money, starting in the UK on iOS and Android

Testing your first payment  —  Sending your first payment Bruce Schneier / Schneier on Security : Signal Adds Cryptocurrency Support Stephen Diehl : Et tu, Signal? Liam Tung / ZDNe...

2021-01-15
I had kind of missed this last autumn, but Apple made its own apps bypass firewalls and VPNs for a while? That sounds really bad... https://www.zdnet.com/...
2021-01-15 View on X
ZDNet

Apple has removed a controversial feature in macOS 11.2 beta 2 that allowed its own apps to bypass third-party firewalls, security tools, and VPNs

The ContentFilterExclusionList has been removed in macOS 11.2 beta 2.  —  Apple has removed a controversial feature from the macOS operating system …

2020-10-29
“Who died and made these men kings?” If you read one thing on those tech hearings, let it be this piece by @zeynep https://zeynep.substack.com/ ...
2020-10-29 View on X
Wired

The Senate's Section 230 hearing, with Dorsey, Zuckerberg, and Pichai, only briefly discussed the law, instead letting Republicans berate Dorsey for soundbites

Republican senators unloaded on Twitter's Jack Dorsey, but had little to say about reforming the foundational internet law.

2020-10-12
Whether you have five or seven eyes, encryption backdoors are a really bad idea https://www.zdnet.com/...
2020-10-12 View on X
ZDNet

Five Eyes governments as well as India and Japan make a new call for backdoors into products that are end-to-end encrypted

A number of experts have pointed to the information … Manik Berry / Fossbytes : Five Eyes, India, And Japan Want ‘Backdoor’ To End-To-End Encryption Phil Muncaster / infosecurity-m...

2020-09-18
Google now formally bans stalkerware from Google Play https://www.zdnet.com/... I disagree with @campuscodi: I don't really think they leave a giant loophole, for they require child monitoring apps to show persistent notifications. Most stalkerware doesn't use Google Play though.
2020-09-18 View on X
ZDNet

Google updates Play Store rules banning stalkerware apps unless they include an “adequate notice or consent” and show a “persistent notification”

Catalin Cimpanu / ZDNet :

2020-09-04
Hey, @joncallas joined the @EFF and that makes me happy https://www.eff.org/...
2020-09-04 View on X
Electronic Frontier Foundation

Jon Callas, formerly of Apple, Blackphone, PGP Corp, and co-founder of Silent Circle, joins EFF as Technology Projects Director

Some of the most important work we do at EFF is build technologies to protect users' privacy and security, and give developers tools to make the entire Internet ecosystem more safe...

2020-03-03
Nice article on the Wireguard VPN software. I started using it with Algo last year and was pleasantly surprised by how easy it was to set up https://www.wired.com/...
2020-03-03 View on X
Wired

A look at WireGuard, a lightweight and simple open source VPN tool and protocol that will soon be part of the Linux kernel

compared with tens of thousands of lines in other VPNs. That doesn't make it more secure, but it does make it easier to find and fix problems. https://www.wired.com/... @z3rotrust ...

2020-02-28
Finding out that mobile malware abuses Accessibility functions always hurts a little bit more. In this overview of mobile RATs, Cerebrus uses it to steal 2FA tokens from Google Authenticator running on the same device https://www.threatfabric.com/ ...
2020-02-28 View on X
ZDNet

Researchers find an Android malware strain Cerberus that can extract and steal one-time passwords generated by Google's Authenticator mobile app

Catalin Cimpanu / ZDNet :

2020-01-31
Avast decides to shut down Jumpshot, which is pretty much the only thing they could do https://blog.avast.com/... Pro-tip: if your company has grown pretty large, hire some privacy expert(s) to assess the privacy impact of the various things you do, before @josephfcox finds out
2020-01-31 View on X
ZDNet

Avast will shut down its marketing subsidiary Jumpshot following controversy over selling user data to third parties

Avast's CEO said the move is “absolutely the right thing to do.”  —  Avast is winding down its subsidiary Jumpshot following an explosive investigation into the sale …

2020-01-30
Avast decides to shut down Jumpshot, which is pretty much the only thing they could do https://blog.avast.com/... Pro-tip: if your company has grown pretty large, hire some privacy expert(s) to assess the privacy impact of the various things you do, before @josephfcox finds out
2020-01-30 View on X
ZDNet

Avast will shut down its marketing subsidiary Jumpshot following controversy over selling user data to third parties

Avast's CEO said the move is “absolutely the right thing to do.”  —  Avast is winding down its subsidiary Jumpshot following an explosive investigation into the sale …

2019-09-30
I'm with Eva here and to the various people pointing out you need physical access to jailbreak an iPhone: this is the stalkerware threat model. https://twitter.com/...
2019-09-30 View on X
Ars Technica

Checkm8 creator says his iPhone exploit requires physical device access and lacks persistence after reboot, but will make jailbreaking more accessible and safer

@dangoodin001 interviews @axi0mX and gets all the details on the new iOS bootrom exploit. https://arstechnica.com/... Dan Goodin / @dangoodin001 : The jailbreaking exploit released...

2019-09-29
I'm with Eva here and to the various people pointing out you need physical access to jailbreak an iPhone: this is the stalkerware threat model. https://twitter.com/...
2019-09-29 View on X
ZDNet

Researcher claims he found “a permanent unpatchable bootrom exploit” for iOS devices with A5 to A11 chips, enabling jailbreaks for iPhone 4S to X, releases code

New jailbreak will work on iPhones 4S up to iPhone 8 and X.  —  A security researcher has released today …