Is there a point, @OrinKerr, where courts go back and revisit past precedent on surveillance in “public areas” in light of radically changed technical capabilities?
It seems like a lot of our societal norms are built on the idea we’ll never get face recognition working reliably at large scale. https://twitter.com/mbrennanchina/status/1109741811310837760?s=21
Wow! China Airport face recognition systems to help you check your flight status and find the way to your gate. Note I did not input anything, it accurately identified my full flight information from my face! – at Terminal 1 Departures
Molly Sauter wrote a good piece about it https://limn.it/articles/the-illicit-aura-of-information/
Does anyone remember the “climategate” hack of East Anglia CRU in 2009? How similar was the MO of that hack to the DNC et al. email breaches of 2016?
I’m secretly obsessed with Brexit, only because it’s nice when someone is more screwed up than your country.
I will send you money if you can ship one of these... things to me. I’m desperate.
Ok, you know when someone says “asking for a friend” and you know they’re really just ashamed of their weirdness? Well, I’m really asking for a friend: does anyone in the UK know how to order one of these to the US?
I’m also worried that “make our conferences bigger and more diffuse” is the wrong answer, where we should be focusing more on tighter and more specialized sub-communities and some kind of process for communicating results between them.
Very happy to announce that our work titled “Wireless attacks on aircraft instrument landing systems” has been accepted to Usenix Security 2019 @USENIXSecurity . The video of the attack is here https://www.youtube.com/watch?v=Wp4CpyxYJq4&feature=youtu.be
Tesla infotainment system popped #Pwn2Own
Submitting the report to Barr is only the first step. Mueller also has to get the margins approved by the DoJ librarian and pay any outstanding fees before he can officially graduate.
It’s especially frustrating because our field has built the expectation in the market that fawning 3rd party reports are a norm, available to any “serious” company. Immense pressure now for all firms to write them! Fuck this shit.
This is absolutely shocking. Iman Fadil, the 34 Moroccan model who was due to give evidence against former Italian PM Silvio Burlusconi (one of Putin’s best friends) in the Bunga Bunga trial suddenly died of radioactive poison before trial https://www.thetimes.co.uk/article/200684ec-4781-11e9-924d-9729bcd51a7f
So, something weird happened a year and a half ago I've never talked about. It was a direct message from a white supremacist.
I just published Under Trump, Witness Protection has been infiltrated by the Russian Mafia. https://thesternfacts.com/under-trump-witness-protection-has-been-infiltrated-by-the-russian-mafia-f6e4825f10a5
Maybe I’m old fashioned, but I think politicians should be politicians, and hackers should be hackers, and the two groups should regard each other with mutual antipathy.
Recommended series of lattice key-exchange papers (in reading order): Ding et al 2012, Peikert 2014, BCNS 2015, NewHope, 2016. These build on each other and the improvements between each paper is clearly described.
@matthew_d_green 's wonderful analogies. Three of these were in the same thread recently, but the bacon house thing is a classic. There must be much, much more.
TIL vendors are allowed to update their software up until the day of pwn2own, and many ship patches the night before. This seems unfair and counterproductive.