Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#ENCRYPTION
Beta Cuck 4 Lyfe
BetasGamma
1You may have heard recently of phone surveillance tech being used against protestors (and anyone who happens to be ANYWHERE NEAR what the Feds *declare* to be a protest.)This thread's
Read more
Tim Legrand
timlegrand
Hello folks! I'm delighted to be first up in the "Understanding the Five Eyes" Twitter conference, with many thanks to @uOttawaCIPS Here, in just 13 short tweets, is my paper:
Read more
Micah Lee
micahflee
I’m sitting outside during quarantine reading Zoom’s new “E2E Encryption for Zoom Meetings” and it’s pretty interesting.First things I notice: I recognize some of these names, and it uses a
Read more
Trent 💊🆔
trentyarwood
This is a good thread explaining why the app might be usefulhttps://twitter.com/peripatetical/status/1254351060891627520 I agree with Allen's points by and large. Especially where he points out that the app is adjunctive
Read more
Alec Muffett
AlecMuffett
Let's wind the clock back to 1997, and then look at the @ukhomeoffice press release earlier today:«LICENSING OF TRUSTED THIRD PARTIESFOR THE PROVISION OF #ENCRYPTION SERVICESPublic Consultation PaperonDetailed Proposals for
Read more
Hunter Trujillo
cryptoquick
On the Rust version of @Filecoin, we're adding a new feature to encrypt the keystore (where we keep crypto wallet keys) before we head into our first security audit.When the
Read more
Nikhil Pahwa
nixxin
I've seen comments pointing out #NetNeutrality concerns reg Facebook's investment in Reliance Jio. My comments:1. Fact is, Jio and Fb were on the same side, with slightly different approaches,
Read more
Jake Chervinsky
jchervinsky
1/ There's been so much regulatory & enforcement news in crypto lately, it's impossible to keep up.So instead of getting lost in the details, let's step back & consider the
Read more
x0rz 😷
x0rz
Does anyone know more about this "Utopia P2P ecosystem" thing? https://u.is/en/ It looks super shady to me when an anonymous group claims to solve privacy while keeping its software closed-source, so
Read more
James St.Onge - Art of Engineering
aoEngineering
Something fascinating about the @YouTube bitcoin scams is that they often use addresses containing specific keywords. Bitcoin addresses are generated by cryptographic hash functions, and it is practically impossible to
Read more
Zero HP Lovecraft 🦅🐍
0x49fa98
One or /ourguys/, a tiny account, got doxed. It was obviously someone he knew who did it, and in response, he an heroed. So let’s quickly talk about opsecEvery single
Read more
Miguel Morales
therevoltingx
Alright ya'll I'm opening up our research into advertising privacy, identity, and cryptographic compliance. This research has been pretty open to people within IAB. But let's open it up to
Read more
Brianna Wu
BriannaWu
1/ Hey all! Brianna here. I do not personally write every Tweet that goes out here. Earlier today, a Tweet went out about Zoom and valid infosec concerns. Some of
Read more
Fundación Datos Protegidos
datosprotegidos
La app de Zoom para iOS envía datos a Facebook sobre tu dispositivo, tu conexión e incluso el identificador personal para publicidad del dispositivo… aunque no tengas cuenta Facebook:https://www.vice.com/en_us/article/k7e599/zoom-ios-app-sends-data-t
Read more
Paul Karp
Paul_Karp
The problem the pandemic has shown up is that our political culture is not robust enough to mediate differences of values re the balance of public safety and personal freedom.
Read more
balajis.com
balajis
Domain name > real nameA domain name may be the most useful type of pseudonym.It pulls up your site as the first hit when punched into a browser; indeed, it
Read more
‹
1
2
3
4
5
6
7
8
...
13
14
›