Deleted tweet detection is currently running at reduced
capacity due to changes to the Twitter API. Some tweets that have been
deleted by the tweet author may not be labeled as deleted in the PolitiTweet
interface.
Showing page 108 of 151.
Joanna Rutkowska @rootkovska
@orionwl If you're building, say, a whole new OS, you can't audit everything. Hence e.g. we (@QubesOS) trust Fedora, Linux, Xen signatures. — PolitiTweet.org
Joanna Rutkowska @rootkovska
@orionwl I don't care "what the name looks like", hence the req for proof of work. — PolitiTweet.org
Joanna Rutkowska @rootkovska
IOW, for an open source project, I think it mostly matters to classify contributors according to their "proof of work" abilities. — PolitiTweet.org
Joanna Rutkowska @rootkovska
... this requirement thus obviously favors pseudonymous devs over anonymous. Of course exceptions do apply. — PolitiTweet.org
Joanna Rutkowska @rootkovska
Yes, but assuming they earned trust with some "proof of work". Otherwise auditing their work offsets contribution. https://t.co/uxS19hXdSE — PolitiTweet.org
74810b012346c9a6 @orionwl
I see nothing wrong with having anonymous/pseudonymous contributors in an open source project, especially controversial ones like #bitcoin
Joanna Rutkowska @rootkovska
RT @4Dgifts: Blockchain is the new "military grade encryption". — PolitiTweet.org
Joanna Rutkowska @rootkovska
The good thing about MS Windows is that we can still opt out of using it. This cannot be said about Intel ME though. https://t.co/FCWWMPlRDq — PolitiTweet.org
Parisa Tabriz @laparisa
Troubling overview of the blatent disregard for user choice & privacy in Windows 10: https://t.co/vBcAIMV2Io via @EFF
Joanna Rutkowska @rootkovska
RT @laparisa: Troubling overview of the blatent disregard for user choice & privacy in Windows 10: https://t.co/vBcAIMV2Io via @EFF — PolitiTweet.org
Joanna Rutkowska @rootkovska
RT @jamesiry: A black hole warps both time and space. Here, let my cat demonstrate. https://t.co/3VTtmp3Xvl — PolitiTweet.org
Joanna Rutkowska @rootkovska
RT @anarchoass: "Cashless society is a euphemism for the ask-your banks-for-permission-to-pay" https://t.co/bIetNGz4u9 — PolitiTweet.org
Joanna Rutkowska @rootkovska
The thread from this message on & below is amusing :) https://t.co/FG4ZamUw6h — PolitiTweet.org
Peter Todd @peterktodd
.@timpastoor @iang_fc @jgarzik @muneeb Yes I can. Your grandmother - Apollo program veteran - uses @QubesOS w/ a @BitcoinTrezor and...
Joanna Rutkowska @rootkovska
@DrWhax Welcome to the club of ruthless plant murderers ;) — PolitiTweet.org
Joanna Rutkowska @rootkovska
@dlitchfield That I like :) — PolitiTweet.org
Joanna Rutkowska @rootkovska
@dlitchfield Sure, but given limited resources to be spent we shall pick a target, one by one. — PolitiTweet.org
Joanna Rutkowska @rootkovska
@dlitchfield Er, you mean: at the endpoint level, right? I consider it prudent to always assume network to be untrusted, don't you agree? — PolitiTweet.org
Joanna Rutkowska @rootkovska
RT @petertoddbtc: Changing who those authorities are is a simple config change; might even be possible to use nodes from multiple authoriti… — PolitiTweet.org
Joanna Rutkowska @rootkovska
RT @petertoddbtc: Tor is a centralised network based on trusted authoritiws; very interesting if multiple authorities existed. https://t.co… — PolitiTweet.org
Joanna Rutkowska @rootkovska
@brian_reiter @dakami Thus I would argue the most secure setup would be a number of physically-isolated Qubes machines :) — PolitiTweet.org
Joanna Rutkowska @rootkovska
@brian_reiter @dakami Side- and covert-channels are a disadvantage, however. As are occasional fatal bugs in Xen :( — PolitiTweet.org
Joanna Rutkowska @rootkovska
@brian_reiter @dakami This means e.g. you can't afford "open each PDF in a fresh new, disposable machine". — PolitiTweet.org
Joanna Rutkowska @rootkovska
@brian_reiter @dakami 2) airgap means only limited and fixed number of "domains", which limits your ability to flexibly decompose workflows. — PolitiTweet.org
Joanna Rutkowska @rootkovska
@brian_reiter @dakami (...) This means a bug in USB stack/partition or fs parsing can negate the airgapness. This is the "XSA148 equivalent" — PolitiTweet.org
Joanna Rutkowska @rootkovska
@brian_reiter @dakami 1) you need a way to transfer data in/out of an airg-apped system. USB is often used for this. (1/) — PolitiTweet.org
Joanna Rutkowska @rootkovska
RT @taviso: It's tough to get security appliances to audit, many vendors blacklist me (seriously). If you work for a vendor & want to help,… — PolitiTweet.org
Joanna Rutkowska @rootkovska
@bleidl @subgraph That's a bad idea IMHO. It would be abused by attackers, I think. — PolitiTweet.org
Joanna Rutkowska @rootkovska
Meaningful deterrence based on inevitable detection is complicated IRL by the need to protect user's privacy. https://t.co/BR8sDWqdli — PolitiTweet.org
Bruce Leidl @bleidl
@rootkovska @subgraph At this stage the entire thing is more of a concept to explore with research and experimentation than a specific plan
Joanna Rutkowska @rootkovska
@bleidl @subgraph So my Q was: how to make this meaningful for 99% of users (who are unable to analyze it) w/o sacrificing their privacy? — PolitiTweet.org
Joanna Rutkowska @rootkovska
@bleidl @subgraph So, what do you mean by "SGOS will act on [collected] data"? — PolitiTweet.org
Joanna Rutkowska @rootkovska
@subgraph How are you going to balance this with... privacy? — PolitiTweet.org
Joanna Rutkowska @rootkovska
@hypatiadotca @letoams "infosec" for me means: (offensive) researchers. In contrast to: developers, activists, evangelists, sells, etc. — PolitiTweet.org