Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#ENCRYPTION
Dave Kennedy
HackingDave
It has always been my goal to appropriately communicate to the media what is happening out there and what amazing work the security industry is doing.I have to be honest,
Read more
Ian Miers
secparam
Forward secrecy and metadata privacy are two of my favorite crypto topics. A KGB training manual contains a good story of why: 1) The GRU detects a new CIA radio
Read more
balajis.com
balajis
Alternatively, we can try to build a culture that rejects surveillance journalism and uses pseudonymity, encryption, and incentives to defend privacy.These media corporations are just Stasi with stock symbols. They
Read more
Lulu Friesdat
LuluFriesdat
Thread 1. #LosAngeles Done listening to 3 hours of testimony & public comments about the LA Voting System. Incredible that in all that time not a single member of the
Read more
Jeremy Malcolm
qirtaiba
There’s less than a week until Europe closes submissions on a consultation that could see Internet platforms being required to monitor ALL your emails, chats, and photos—even if they’re encrypted—using
Read more
zender 🔰 Taproot by BIP8
zndtoshi
Everyone's a scammer!If you only want to buy bitcoins and store for long term, there's hundreds of wallets and backup products that are advertised to you. But if you don't
Read more
John Scott-Railton
jsrailton
WOW! Just discovered that Rod Rosenstein is defending spyware company NSO Group in the @WhatsApp case. Quite the career pivot after prosecuting foreign hackers as Deputy Attorney General. THREAD 1/
Read more
Firestarter
Firezstarter1
This could merely be an import substitution for an existing product. There are other items in the list which are similar. The OSA-AK parts for instance. The lost is clearly
Read more
Danny Diekroeger
dannydiekroeger
~ Tor and the Dark Web ~What is Tor? Why do people use it? How does it work to protect privacy?Thread 2/ The Internet might feel like magic, but
Read more
ı
marc_ahx
v¹igil a·nt¹ismhttps://www.youtube.com/watch?v=q0BaxJfqTFo #angerfist #nugabber #anon #anonymous #mrRobot #2600 @The_Cr33d @george_bunde I just look at black and I'm like..wtf you doing. do you have any idea how powerful they arehow
Read more
ricardo schiller | #BlockBase
ricardoschiller
I was asked about the differences between a #blockbase sidechain and a private #EOSIO chain. These were my answers: thread (1/8) a blockbase sidechain can be public, private or mixed,
Read more
AVS🇮🇳😷
avs_IND
Questions: How does an #Aadhaar card work? Is it really possible to Hack #Aadhar System? How vulnerable is the Aadhaar database to unauthorized access? Can the system successfully trace unauthorized
Read more
Island DAO
islanddao
Open-source research on the wiki: https://github.com/IslandDAO/IslandDAO.github.io/wikiOtherwise, if you engage in secrecy, it becomes a game of who has better encryption protocols.By definition we are anti-fragile and welcome scrutiny from all
Read more
Ben Adida
benadida
1/ a little story. When I was 18yo, summer 1995, I had the immense luck of working as an intern at Hearst Publishing in NYC. I was a rising sophomore,
Read more
JOSÆPH 🥦, ❤️ & 🚅
CupOJoseph
In 1999, there were 23 blogs. In 2006, there were 50 million+ blogsIn 2020 there are like 6 crypto apps. In 2027 there will be… Hopefully at least 23 Who
Read more
Mishi Choudhary
MishiChoudhary
#WhatsApp snooping: Mobile phone OS is far from secure India is witnessing a massive cyberattack against civilians. The civilians whose lives have been attacked include prominent rights advocates, politicians and
Read more
‹
1
2
3
4
5
6
7
8
...
13
14
›