Deleted tweet detection is currently running at reduced capacity due to changes to the Twitter API. Some tweets that have been deleted by the tweet author may not be labeled as deleted in the PolitiTweet interface.

Showing page 108 of 151.

Profile Image

Joanna Rutkowska @rootkovska

@orionwl If you're building, say, a whole new OS, you can't audit everything. Hence e.g. we (@QubesOS) trust Fedora, Linux, Xen signatures. — PolitiTweet.org

Posted Aug. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

@orionwl I don't care "what the name looks like", hence the req for proof of work. — PolitiTweet.org

Posted Aug. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

IOW, for an open source project, I think it mostly matters to classify contributors according to their "proof of work" abilities. — PolitiTweet.org

Posted Aug. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

... this requirement thus obviously favors pseudonymous devs over anonymous. Of course exceptions do apply. — PolitiTweet.org

Posted Aug. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

Yes, but assuming they earned trust with some "proof of work". Otherwise auditing their work offsets contribution. https://t.co/uxS19hXdSE — PolitiTweet.org

74810b012346c9a6 @orionwl

I see nothing wrong with having anonymous/pseudonymous contributors in an open source project, especially controversial ones like #bitcoin

Posted Aug. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

RT @4Dgifts: Blockchain is the new "military grade encryption". — PolitiTweet.org

Posted Aug. 23, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

The good thing about MS Windows is that we can still opt out of using it. This cannot be said about Intel ME though. https://t.co/FCWWMPlRDq — PolitiTweet.org

Parisa Tabriz @laparisa

Troubling overview of the blatent disregard for user choice & privacy in Windows 10: https://t.co/vBcAIMV2Io via @EFF

Posted Aug. 21, 2016
Profile Image

Joanna Rutkowska @rootkovska

RT @laparisa: Troubling overview of the blatent disregard for user choice & privacy in Windows 10: https://t.co/vBcAIMV2Io via @EFF — PolitiTweet.org

Posted Aug. 21, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

RT @jamesiry: A black hole warps both time and space. Here, let my cat demonstrate. https://t.co/3VTtmp3Xvl — PolitiTweet.org

Posted Aug. 21, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

RT @anarchoass: "Cashless society is a euphemism for the ask-your banks-for-permission-to-pay" https://t.co/bIetNGz4u9 — PolitiTweet.org

Posted Aug. 21, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

The thread from this message on & below is amusing :) https://t.co/FG4ZamUw6h — PolitiTweet.org

Peter Todd @peterktodd

.@timpastoor @iang_fc @jgarzik @muneeb Yes I can. Your grandmother - Apollo program veteran - uses @QubesOS w/ a @BitcoinTrezor and...

Posted Aug. 21, 2016
Profile Image

Joanna Rutkowska @rootkovska

@DrWhax Welcome to the club of ruthless plant murderers ;) — PolitiTweet.org

Posted Aug. 19, 2016
Profile Image

Joanna Rutkowska @rootkovska

@dlitchfield That I like :) — PolitiTweet.org

Posted Aug. 19, 2016
Profile Image

Joanna Rutkowska @rootkovska

@dlitchfield Sure, but given limited resources to be spent we shall pick a target, one by one. — PolitiTweet.org

Posted Aug. 19, 2016
Profile Image

Joanna Rutkowska @rootkovska

@dlitchfield Er, you mean: at the endpoint level, right? I consider it prudent to always assume network to be untrusted, don't you agree? — PolitiTweet.org

Posted Aug. 19, 2016
Profile Image

Joanna Rutkowska @rootkovska

RT @petertoddbtc: Changing who those authorities are is a simple config change; might even be possible to use nodes from multiple authoriti… — PolitiTweet.org

Posted Aug. 19, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

RT @petertoddbtc: Tor is a centralised network based on trusted authoritiws; very interesting if multiple authorities existed. https://t.co… — PolitiTweet.org

Posted Aug. 19, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

@brian_reiter @dakami Thus I would argue the most secure setup would be a number of physically-isolated Qubes machines :) — PolitiTweet.org

Posted Aug. 18, 2016
Profile Image

Joanna Rutkowska @rootkovska

@brian_reiter @dakami Side- and covert-channels are a disadvantage, however. As are occasional fatal bugs in Xen :( — PolitiTweet.org

Posted Aug. 18, 2016
Profile Image

Joanna Rutkowska @rootkovska

@brian_reiter @dakami This means e.g. you can't afford "open each PDF in a fresh new, disposable machine". — PolitiTweet.org

Posted Aug. 18, 2016
Profile Image

Joanna Rutkowska @rootkovska

@brian_reiter @dakami 2) airgap means only limited and fixed number of "domains", which limits your ability to flexibly decompose workflows. — PolitiTweet.org

Posted Aug. 18, 2016
Profile Image

Joanna Rutkowska @rootkovska

@brian_reiter @dakami (...) This means a bug in USB stack/partition or fs parsing can negate the airgapness. This is the "XSA148 equivalent" — PolitiTweet.org

Posted Aug. 18, 2016
Profile Image

Joanna Rutkowska @rootkovska

@brian_reiter @dakami 1) you need a way to transfer data in/out of an airg-apped system. USB is often used for this. (1/) — PolitiTweet.org

Posted Aug. 18, 2016
Profile Image

Joanna Rutkowska @rootkovska

RT @taviso: It's tough to get security appliances to audit, many vendors blacklist me (seriously). If you work for a vendor & want to help,… — PolitiTweet.org

Posted Aug. 18, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

@bleidl @subgraph That's a bad idea IMHO. It would be abused by attackers, I think. — PolitiTweet.org

Posted Aug. 17, 2016
Profile Image

Joanna Rutkowska @rootkovska

Meaningful deterrence based on inevitable detection is complicated IRL by the need to protect user's privacy. https://t.co/BR8sDWqdli — PolitiTweet.org

Bruce Leidl @bleidl

@rootkovska @subgraph At this stage the entire thing is more of a concept to explore with research and experimentation than a specific plan

Posted Aug. 17, 2016
Profile Image

Joanna Rutkowska @rootkovska

@bleidl @subgraph So my Q was: how to make this meaningful for 99% of users (who are unable to analyze it) w/o sacrificing their privacy? — PolitiTweet.org

Posted Aug. 17, 2016
Profile Image

Joanna Rutkowska @rootkovska

@bleidl @subgraph So, what do you mean by "SGOS will act on [collected] data"? — PolitiTweet.org

Posted Aug. 17, 2016
Profile Image

Joanna Rutkowska @rootkovska

@subgraph How are you going to balance this with... privacy? — PolitiTweet.org

Posted Aug. 17, 2016
Profile Image

Joanna Rutkowska @rootkovska

@hypatiadotca @letoams "infosec" for me means: (offensive) researchers. In contrast to: developers, activists, evangelists, sells, etc. — PolitiTweet.org

Posted Aug. 17, 2016