/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Charles Guillemet

@p3b7_
10 posts
2025-09-09
If you use a Ledger or hardware wallet with clear signing, you are not at risk. My tweet above is warning people who do not use a hardware wallet with clear signing of the risk. Always review every transaction before you sign.
2025-09-09 View on X
BleepingComputer

Aikido Security says attackers injected malware into 18 npm packages with 2.6B+ total weekly downloads, after compromising a maintainer's account via phishing

Popular npm packages debug and chalk were recently compromised, exposing developers and organizations to potential malware risk. … Charlie Eriksen : Hello.  It feels like the first...

🚨 There's a large-scale supply chain attack in progress: the NPM account of a reputable developer has been compromised. The affected packages have already been downloaded over 1 billion times, meaning the entire JavaScript ecosystem may be at risk. The malicious payload works
2025-09-09 View on X
BleepingComputer

Aikido Security says attackers injected malware into 18 npm packages with 2.6B+ total weekly downloads, after compromising a maintainer's account via phishing

Popular npm packages debug and chalk were recently compromised, exposing developers and organizations to potential malware risk. … Charlie Eriksen : Hello.  It feels like the first...

2025-07-24
Gradually, then all at once. Traditional finance is tokenizing all the things, making it faster, cheaper, interoperable, and composable. Blockchain technology is quickly becoming the backbone of global financial infrastructure. https://www.cnbc.com/...
2025-07-24 View on X
CNBC

Goldman Sachs and BNY partner to let institutional investors purchase tokenized money market funds, with ownership recorded on Goldman's blockchain platform

Hugh Son / CNBC :

2023-10-26
I'm still amazed by how powerful spectre attack is! It's also a good reminder that laptop and mobile devices are not designed for security. Don't store your valuable on these devices...
2023-10-26 View on X
Ars Technica

Researchers reveal an attack forcing iOS and macOS WebKit browsers to divulge secrets, like passwords and email content, of users who visit a malicious website

iLeakage is practical and requires minimal resources.  A patch isn't (yet) available.  —  Researchers have devised an attack …

2023-08-09
Yet another variation of Spectre and Meltdown that bypasses current mitigations. And guess what? SGX is also affected. The vulnerability basically allows an attacker to spy on other processes and steal (secret) data. https://www.wired.com/...
2023-08-09 View on X
Wired

Intel fixes a flaw found by a Google researcher that could let attackers steal passwords and other secrets, affecting Skylake, Tiger Lake, and Ice Lake chips

The vulnerability could allow attackers to take advantage of an information leak to steal sensitive details like private messages, passwords, and encryption keys.

2023-08-07
This side channel is fun. It's possible to guess what you type on your keyboard just listening to the sound it does. 93% accuracy on zoom call! https://www.bleepingcomputer.com/ ...
2023-08-07 View on X
BleepingComputer

UK researchers train a deep learning model that can steal data from keyboard keystrokes recorded using a microphone with 95% accuracy overall and 93% on Zoom

A team of researchers from British universities has trained a deep learning model that can steal data from keyboard keystrokes recorded using …

2022-12-29
We're getting closer to physics boundaries! TSMC launches 3nm techno mass production and is preparing the 2nm. It also highlights the concerns over global reliance on Taiwan for high-end tech https://www.bloomberg.com/...?
2022-12-29 View on X
Bloomberg

TSMC begins mass producing 3nm chips in Taiwan, which need ~35% less power than 5nm chips, following Samsung, and also promises to build 2nm plants in Taiwan

Taiwan Semiconductor Manufacturing Co. kicked off mass production of next-generation chips Thursday, ensuring the island remains …

2022-11-11
After the FTX earthquake, there's a massive outflow from exchanges to @ledger security and self sovereignty solutions ✊ We see a massive usage of our platforms and had a few scalability challenges this night. It should be resolved now. https://twitter.com/...
2022-11-11 View on X
@sbf_ftx

[Thread] FTX CEO Sam Bankman-Fried apologizes, says he “fucked up” and his priority is “doing right by users”, plans to raise funds and close Alameda, and more

1) I'm sorry. That's the biggest thing. I fucked up, and should have done better.

2021-05-02
Ouch! Yet another vulnerability on x86 opcodes. It defeats all countermeasures against Spectre! https://engineering.virginia.edu/ ...
2021-05-02 View on X
Tom's Hardware

Researchers find new exploit leaving all modern AMD and Intel processors with micro-op caches defenseless to Spectre threat, in spite of all current mitigations

Micro-op caches prone to attacks.  —  Researchers from two universities have discovered several new variants of Spectre exploits … Source: University of Virginia School … .

2020-03-06
Unfixable vulnerability found on Intel chips. The ROM of CSME is vulnerable which breaks the root of Trust. “The vulnerability allows extracting the Chipset Key and manipulating part of the hardware key and the process of its generation.” http://blog.ptsecurity.com/... https://twitter.com/...
2020-03-06 View on X
Ars Technica

An unfixable flaw in nearly all Intel chips released in last five years allows sophisticated attackers access to mask ROM of its chipsets and microprocessors

Converged Security and Management Engine flaw may jeopardize Intel's root of trust.  —  Virtually all Intel chips released …