/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Ian Barwise

@z3rotrust
6 posts
2020-07-26
“Carriers typically charge an early termination fee for canceling a contract before it's over, which can amount to hundreds of dollars. Some survivors can't afford to begin paying for a new device and wireless plan on their own.” https://www.wired.com/... via @wired
2020-07-26 View on X
Wired

Experts call for US legislation to make it easy for domestic abuse victims to leave family phone plans, which can be used by abusers to stalk their victims

who they talk to, their location, everything. https://www.semanticscholar.org/ ... https://twitter.com/... Louise Matsakis / @lmatsakis : Let me tell you about an extremely upsetti...

2020-05-11
“All the evil maid needs to do is unscrew the backplate, attach a device momentarily, reprogram the firmware, reattach the backplate, and the evil maid gets full access to the laptop,” https://www.wired.com/... via @wired
2020-05-11 View on X
Wired

Researcher: PCs with Thunderbolt ports have an unpatchable flaw letting hackers with physical access circumvent data safeguards; some new PCs are not affected

The so-called Thunderspy attack takes less than five minutes to pull off with physical access to a device, and affects any PC manufactured before 2019.

2020-04-23
“There's arguably never been a better time to be a government hacker,” & “This is beyond the wildest dreams of the attacker in terms of the scale of remote work,” https://www.wired.com/... via @wired
2020-04-23 View on X
Wired

Google's Threat Analysis Group shares a report outlining efforts by over 12 state-sponsored hackers using COVID-19 as cover for espionage

Lily Hay Newman / Wired :

2020-03-03
“...adding WireGuard to the Linux kernel will make it useful for securing connections between Internet of Things devices, many of which run on Linux.” https://www.wired.com/... via @wired
2020-03-03 View on X
Wired

A look at WireGuard, a lightweight and simple open source VPN tool and protocol that will soon be part of the Linux kernel

compared with tens of thousands of lines in other VPNs. That doesn't make it more secure, but it does make it easier to find and fix problems. https://www.wired.com/... @z3rotrust ...

2020-02-27
“Kr00k exploits a weakness that occurs when wireless devices disassociate from a wireless access point.” Flaw in billions of Wi-Fi devices left communications open to eavesdropping https://arstechnica.com/...
2020-02-27 View on X
Ars Technica

Bug in Cypress and Broadcom Wi-Fi chips meant billions of devices, many now patched, were left open to eavesdropping; Apple, Amazon, and others were affected

Dan Goodin / Ars Technica :

2020-01-24
“Shlayer is “a rather ordinary piece of malware” that, except for a recent variant based on a Python script, was built on Bash commands.” Mac users are getting bombarded by laughably unsophisticated malware https://arstechnica.com/...
2020-01-24 View on X
Threatpost

Kaspersky Lab: in 2019, ~30% of all macOS malware detections derived from the Shlayer trojan, an unsophisticated malware that spreads via fake app installs

The malvertising-focused trojan known as Shlayer has burbled to the top of the malware heap when it comes to targeting Mac users.