Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#Security
Blake Johnson
voteblake
HIRING THREAD: On a team meeting today I realized we have *EIGHT* open roles and want to get these out in front of people. Links and brief descriptions follow. Our
Read more
Cory Doctorow
doctorow
Smart sex-toys are a terrible idea, notwithstanding the ways that they work for certain kinks (to say nothing of sex workers, who can charge for access to them during livestreams).
Read more
Christopher Glyer
cglyer
This shouldn’t be news to anyone,but human operated ransomware is a problem that has gotten completely out of controlThe reasons are relatively straightforward: The cost to pay is often significantly
Read more
Pradheep J. Shanker
Neoavatara
Suspect in Portland Gun Murder: Self-Identified Antifa “Security” Previously Arrested For Possessing Firearm — Not Charged By Portland DAhttps://www.redstate.com/shipwreckedcrew/2020/08/31/suspect-in-portland-killing-self-identified-a
Read more
Scoundrel
ScoundrelBlog
In a nutshell, the Female Relationship Agenda (FRA) is: Find & lock down a PROVIDER.What does a "provider" provide?More than anything, safety, security & a stable future for her (and
Read more
Patrick Bury
PatrickBury
1/4 The UK govt Covid response is increasingly looking like a calamity. Since 2010 the UK’s National Security Risk Assessment has recognised a major public health disaster, in particular pandemic
Read more
😳🍭💕
maryamism_
The UN P5(+1) : A Thread Since it’s violent end in 1845,the Holocaust has served as a testament to the worst aspects of human nature. Through the Holocaust,thousands upon thousands
Read more
Jimmy Van Bramer
JimmyVanBramer
With so much disinformation out there on the Hunters Point waterfront. Here's my view. (THREAD) I’ve had a number of Hunters Point/LIC constituents reach out to my office about the
Read more
Veracity Protocol
VeracityProtocl
Detecting counterfeit crypto wallets and protecting your security. 1/8 Veracity Protocol is the new security standard for physical objects that allows anyone to verify an item’s identity, authenticity, detect
Read more
Todd McKinnon
toddmckinnon
Regardless of your opinion of the outcome of the 2016 election (and of what happens in November), these past few years have been monumental in how we view the sanctity
Read more
Sarah Burssty
SarahBurssty
Stop making "My Twitter Family:" posts.RoundYearFun is a scam that collects your data and follows other accounts without your permission, its a huge security risk and was exposed recentlyPlease unlink
Read more
Anonymous
YourAnonCentral
For those who may lose TikTok due to the alleged U.S. ban. It cannot be saved but all your content can be. Make sure to backup all your videos, repost
Read more
THORChain ⚡️(ᚱ)
thorchain_org
Many new projects claiming "cross-chain". To cut thru the noise, ask these questions:1) Are the assets wrapped or pegged?If they are wrapped/pegged, the project is out-sourcing security to another protocol.THORChain
Read more
Tristan Glatard
TristanGlatard
I'm excited to share the work of my student @bhangu_kaur, co-supervised with Aiman Hanna @GinaCodySchool:"An Analysis of Security Vulnerabilities in Container Images for Scientific Data Analysis"https://arxiv.org/abs/2010.1397
Read more
AEMSecurity
AEMSecurity
[+] #BugbountyTip: Invalidate / Flush Cached Pages From AEM - This is one of the most under rated vulnerability that hardly anyone knows about! I will share all details in
Read more
Barbara(Flynn)⭐️⭐️⭐️Redgate #WhoLeakedGenFlynn
BarbaraRedgate
Massive numbers of serious crimes committed against General Flynn by Our Own Government have been Exposed-A FEDERAL APPEALS COURT Dismissed Case! Government Dismissed Case With Prejudice! Yet-General Flynn Remains The
Read more
‹
1
2
...
23
24
25
26
27
28
29
...
777
778
›