Deleted tweet detection is currently running at reduced capacity due to changes to the Twitter API. Some tweets that have been deleted by the tweet author may not be labeled as deleted in the PolitiTweet interface.

Showing page 126 of 151.

Profile Image

Joanna Rutkowska @rootkovska

@SwiftOnSecurity Thx, regards. — PolitiTweet.org

Posted Feb. 21, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

This: https://t.co/D8u6KaDlu9 — PolitiTweet.org

Micah Lee @micahflee

I've gotten several emails/comments about using female pronouns to refer to hacker in my latest article is distracting/weird. All from men.

Posted Feb. 21, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

@deuszu Not good: https://t.co/VZMq33vgJS — PolitiTweet.org

Joanna Rutkowska @rootkovska

One potentially overlooked detail of this story: unconditional automatic updates for the OS might be harmful to user https://t.co/ZrC3WzDAkG

Posted Feb. 20, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

A brief history of the last 25 years of Polish politics and how it led to the current situation (via @guardian): https://t.co/xCxKCulksS — PolitiTweet.org

Posted Feb. 20, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

BTW, in PL there are about... 5 female commercial helicopter pilots (2%). And you thought IT was bad, huh? https://t.co/uj0MX2gLkk — PolitiTweet.org

Posted Feb. 20, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

"Women in Helicopter Aviation" documentary: https://t.co/i8yJod0BmY — PolitiTweet.org

Posted Feb. 20, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

RT @ioerror: Sticker of the month by the fantastic @shiromarieke: https://t.co/88UvsXAORN #tor #cloudflare — PolitiTweet.org

Posted Feb. 19, 2016 Retweet Hibernated
Profile Image

Joanna Rutkowska @rootkovska

RT @aral: Facebook blocks Ind.ie. “First they ignore you, then they laugh at you, then they fight you…” https://t.co/w6q3dpP5rp — PolitiTweet.org

Posted Feb. 19, 2016 Retweet Hibernated
Profile Image

Joanna Rutkowska @rootkovska

@flamsmark One that doesn't require (authenticated) user consent. This allows the OS vendor to inject anything into the *seized* device. — PolitiTweet.org

Posted Feb. 17, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

@gusandrews It's both, and we can fight both. Just need not allow *unconditional* automatic updates. — PolitiTweet.org

Posted Feb. 17, 2016 Hibernated
Profile Image

Joanna Rutkowska @rootkovska

@gusandrews Here we're talking about post-factum targeted attacks. See: https://t.co/Y8S0wnr0mb — PolitiTweet.org

Joanna Rutkowska @rootkovska

@bortzmeyer It does! The user whose device was seized won't approve *any* updates anymore.

Posted Feb. 17, 2016 Hibernated
Profile Image

Joanna Rutkowska @rootkovska

@hdevalence Targeted backdoors is the worst kind of vulnerability, b/c they are designed to be exploitable. — PolitiTweet.org

Posted Feb. 17, 2016 Hibernated
Profile Image

Joanna Rutkowska @rootkovska

Many:) But also for many I don't care if DNS resolver is buggy: DispVMs, offline VMs, net-isolated VMs. Thx @QubesOS https://t.co/CDYNKo72PZ — PolitiTweet.org

Paul Wouters ☕️ @letoams

@rootkovska how many broken glibc's did you have :p

Posted Feb. 17, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

@cruizer_ph Yes: @QubesOS :) — PolitiTweet.org

Posted Feb. 17, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

@cruizer_ph The whole OS architecture. @fjserna @mdowd @0xcharlie @dinodaizovi — PolitiTweet.org

Posted Feb. 17, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

@bortzmeyer It does! The user whose device was seized won't approve *any* updates anymore. — PolitiTweet.org

Posted Feb. 17, 2016 Hibernated
Profile Image

Joanna Rutkowska @rootkovska

... clarification: the post-factum *targeted* backdooring. — PolitiTweet.org

Posted Feb. 17, 2016 Hibernated
Profile Image

Joanna Rutkowska @rootkovska

... i.e. the process of unconditionally applying updates w/o user consent makes new types of attacks possible: the post-factum backdooring. — PolitiTweet.org

Posted Feb. 17, 2016 Hibernated
Profile Image

Joanna Rutkowska @rootkovska

One potentially overlooked detail of this story: unconditional automatic updates for the OS might be harmful to user https://t.co/ZrC3WzDAkG — PolitiTweet.org

Kenn White @kennwhite

“They have asked us to build a backdoor to the iPhone.” —Tim Cook https://t.co/eSJQJ8EWeq

Posted Feb. 17, 2016 Hibernated
Profile Image

Joanna Rutkowska @rootkovska

Likely Yet Another Example of why *monolithic* desktop OS architectures remain hopeless security-wise... https://t.co/vMYpgW5uCA — PolitiTweet.org

Fermin J. Serna @fjserna

@fjserna @mdowd @0xcharlie @dinodaizovi but canaries wouldnt have stopped us. We did not go for the direct overwrite. And I cant talk more:(

Posted Feb. 17, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

RT @aral: Dear @tim_cook, Thank you. https://t.co/nALC6yUP7L — PolitiTweet.org

Posted Feb. 17, 2016 Retweet Hibernated
Profile Image

Joanna Rutkowska @rootkovska

RT @FredericJacobs: .@Tim_Cook for President. Not your regular CEO: https://t.co/GZnXLq0JRO https://t.co/ADiqKzIanQ — PolitiTweet.org

Posted Feb. 17, 2016 Retweet Hibernated
Profile Image

Joanna Rutkowska @rootkovska

When algorithms become the judiciary... #CivilizationFail https://t.co/Nko1SQbHpd — PolitiTweet.org

Ⓐnarchotech @anarchotech

"Turning off a mobile phone gets flagged as an attempt to evade mass surveillance." https://t.co/P4qzSYaxze

Posted Feb. 17, 2016 Hibernated
Profile Image

Joanna Rutkowska @rootkovska

RT @fjserna: Do you run Linux and perform DNS queries? Check this glibc RCE (CVE-2015-7547) https://t.co/yfyWogU7EH and PoC https://t.co/Fw… — PolitiTweet.org

Posted Feb. 16, 2016 Retweet Hibernated
Profile Image

Joanna Rutkowska @rootkovska

Another example why securing *monolithic* desktop OSes is considered hard... #BeyondMemoryCorruptions https://t.co/pYrqAYZayH — PolitiTweet.org

Dan Rosenberg @djrbliss

Is it known that Bash tab completion can execute arbitrary code without pressing enter via evaluating Makefile targets? "make [tab]" (boom)

Posted Feb. 16, 2016 Hibernated
Profile Image

Joanna Rutkowska @rootkovska

RT @djrbliss: Is it known that Bash tab completion can execute arbitrary code without pressing enter via evaluating Makefile targets? "make… — PolitiTweet.org

Posted Feb. 16, 2016 Retweet Hibernated
Profile Image

Joanna Rutkowska @rootkovska

This is a great presentation (ht @attractr): https://t.co/K6BrTG1Ccf — PolitiTweet.org

Posted Feb. 15, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

@mikk0j See: https://t.co/tcwjJXTHIu — PolitiTweet.org

Posted Feb. 13, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

@Model500 Sadly, that is not so straightforward anymore: https://t.co/FpqtfNunrv — PolitiTweet.org

Posted Feb. 13, 2016 Deleted after 6 years Hibernated
Profile Image

Joanna Rutkowska @rootkovska

This is silly, annoying, privacy-invading, and security-not-improving. Stop doing that, @StarwoodBuzz. https://t.co/NrjxO2Q2lR — PolitiTweet.org

Posted Feb. 13, 2016 Hibernated