Deleted tweet detection is currently running at reduced
capacity due to changes to the Twitter API. Some tweets that have been
deleted by the tweet author may not be labeled as deleted in the PolitiTweet
interface.
Showing page 19 of 28.
Joanna Rutkowska @rootkovska
@typhoonfilsy Also: good luck on extracting the ME keys! ;) — PolitiTweet.org
Joanna Rutkowska @rootkovska
@typhoonfilsy It's 1) proprietary, 2) closed (user cannot run own code), 3) non-transparent (user cannot verify what runs there) :( — PolitiTweet.org
Joanna Rutkowska @rootkovska
. @olivier_boireau Ah, so: Bank-friendly DRM? You can do the same or better with ME+PTT+SGX. Just don't confuse with trustworthy client, pls — PolitiTweet.org
Joanna Rutkowska @rootkovska
@hashbreaker @hyperelliptic So, how come the site has no .onion address? :P — PolitiTweet.org
Joanna Rutkowska @rootkovska
@olivier_boireau For start: can you explain how your proprietary uC is to be any better than Intel's PTT?@Orwlr @ioerror — PolitiTweet.org
Joanna Rutkowska @rootkovska
@olivier_boireau You know, I think The Long Term Plan should be to move to 3d-printed, fully open source processors... @Orwlr @ioerror — PolitiTweet.org
Joanna Rutkowska @rootkovska
@wpisarski Sure, but the question is what causes them? — PolitiTweet.org
Joanna Rutkowska @rootkovska
This (and not just EU citizens, but ppl in general): https://t.co/9XoDjkGM1c — PolitiTweet.org
Joanna Rutkowska @rootkovska
@yawnbox Where did you get the installer for this Windows 1984? Also how did you get GPG (or SHA1 at least) there? — PolitiTweet.org
Joanna Rutkowska @rootkovska
@Orwlr Now we talkin'! :) Stay tuned. @ioerror @AndreaBarisani — PolitiTweet.org
Joanna Rutkowska @rootkovska
"ORWL: The first open-source physically secure computer". Oh... wait a sec: https://t.co/axFg0lTQsh — PolitiTweet.org
Joanna Rutkowska @rootkovska
Please write a solid document about it @Orwlr, don't just tweet unverifiable, shallow phrases here. Thx. /cc @ioerror — PolitiTweet.org
Joanna Rutkowska @rootkovska
@ioerror Also, ME-implemented TPM (PTT) seems like no match to any 3rd party "secure uC", does it? — PolitiTweet.org
Joanna Rutkowska @rootkovska
When and how? Can you pls provide URL to the actual technical info on this? https://t.co/6bckJNMPDH — PolitiTweet.org
Joanna Rutkowska @rootkovska
@Orwlr Please point me to a document which described this process. @ioerror — PolitiTweet.org
Joanna Rutkowska @rootkovska
@Orwlr How can I verify what firmware really runs on your proprietary uC? @ioerror — PolitiTweet.org
Joanna Rutkowska @rootkovska
@ioerror Correct. But then again: SGX assumes valuable stuff in your processes. Also ME is used for SGX implementation. — PolitiTweet.org
Joanna Rutkowska @rootkovska
@puellavulnerata Right... Oh, wait: https://t.co/mEjk9sSTYJ — PolitiTweet.org
Joanna Rutkowska @rootkovska
@ioerror Heh ;) — PolitiTweet.org
Joanna Rutkowska @rootkovska
@puellavulnerata I suppose Twitter might not be the most spectacular representation of b0rkage of the human race.. Would be great if it was. — PolitiTweet.org
Joanna Rutkowska @rootkovska
So, does the humankind invented a _threaded_ viewer for Twitter yet? — PolitiTweet.org
Joanna Rutkowska @rootkovska
@ioerror Where is 1) uC data sheet? 2) firmware sources? Maybe @Orwlr can respond? — PolitiTweet.org
Joanna Rutkowska @rootkovska
@ioerror Problem is their proprietary uC running nobody-knows-what code. We don't want OEMs to do that for endpoints. @DrPizza @Orwlr — PolitiTweet.org
Joanna Rutkowska @rootkovska
@ioerror If you (want to) trust Intel, then SGX+MS is really strong security. Tell me how @Orwlr could be any better than that? — PolitiTweet.org
Joanna Rutkowska @rootkovska
@ioerror SGX (again if you believe in such solutions) solves the problem of Cold Boot attacks also (all DRAM is encrypted for SGX enclaves) — PolitiTweet.org
Joanna Rutkowska @rootkovska
@ioerror It's not , Intel ME is super tamper-proof, otherwise we would not be so afraid of ME, right? — PolitiTweet.org
Joanna Rutkowska @rootkovska
. @ioerror That doesn't mean I believe we should be entrusting Intel ME and SGX, of course ;) We should not! Neither we should @Orwlr. — PolitiTweet.org
Joanna Rutkowska @rootkovska
@ioerror What could possible @Orwlr offer beyond Intel ME and SGX (while having all the same properties of being a blackbox solution)? — PolitiTweet.org
Joanna Rutkowska @rootkovska
@ioerror If one believes in backboxed tamper-proof mechanisms for securing clients, then Intel ME and SGX is a nobrainer, right? (1/) — PolitiTweet.org
Joanna Rutkowska @rootkovska
I beg to differ: if you're for the tamper-proof stuff, the use Intel ME+SGX... @ioerror @orwlr — PolitiTweet.org