Deleted tweet detection is currently running at reduced capacity due to changes to the Twitter API. Some tweets that have been deleted by the tweet author may not be labeled as deleted in the PolitiTweet interface.

Showing page 92 of 151.

Profile Image

Joanna Rutkowska @rootkovska

RT @micahflee: Something happened to the activist technology collective @riseupnet, but it hasn't been compromised https://t.co/dA6GutyWNQ — PolitiTweet.org

Posted Nov. 30, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

@akochkov Intel already has an infrastructure to replace the coding with encryption for the flash content. Then what? — PolitiTweet.org

Posted Nov. 29, 2016
Profile Image

Joanna Rutkowska @rootkovska

More technical discussion: https://t.co/wtyteDCBPp I share the pessimism with Peter Stuge from this thread. — PolitiTweet.org

Posted Nov. 29, 2016
Profile Image

Joanna Rutkowska @rootkovska

TLDR: removes a bunch of optional ME modules from the flash, but ME still operates (ROM code + a few hundred KBs of… https://t.co/ByuDLvGy0w — PolitiTweet.org

Trammell Hudson ⚙ @qrs

Glad to see my work on disabling the Intel Management engine is being widely reported. Just say No to HW rootkits!… https://t.co/CNEmUHTln7

Posted Nov. 29, 2016
Profile Image

Joanna Rutkowska @rootkovska

Beware of *very* bright programmers. https://t.co/pYCaXJU0rg — PolitiTweet.org

JP Aumasson @veorq

reading Rust code, sometimes looks like authors' goal is to use as many Rust features as possible and make the code unreadable /cc @dchest

Posted Nov. 28, 2016
Profile Image

Joanna Rutkowska @rootkovska

This looks really cool. But I worry how it leaves unique RF fingerprints. Is there a way to do that safely? https://t.co/oGLhI91sb6 — PolitiTweet.org

Posted Nov. 27, 2016
Profile Image

Joanna Rutkowska @rootkovska

@dlmetcalf @micahflee I guess this would require registration of an uri scheme handler, and then we could use e.g.: https://t.co/dvl5TWPm5Z — PolitiTweet.org

Posted Nov. 27, 2016
Profile Image

Joanna Rutkowska @rootkovska

@dlmetcalf @micahflee Exactly. Say, I'd like to tell my Chrome to open all http:// links in another VM (or DispVM). — PolitiTweet.org

Posted Nov. 27, 2016
Profile Image

Joanna Rutkowska @rootkovska

Sometimes I like Tweeter a lot :) https://t.co/ddFCrRVtxE — PolitiTweet.org

Peter Todd @peterktodd

@rootkovska Another option is to use single-use-seals... Which I happen to be writing an article on right now. :) I'll add logging to it.

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@MarioVilas No worries, if I find something meaningful, I will likely post it ;) @azonenberg — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@petertoddbtc But perhaps the timestamp resolution (~10 mins?) might be too coarse-grained for this? — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@petertoddbtc Before the incident, the attack had no keys to spoof the log events, and after (when she got the keys), unable to timestamp? — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@petertoddbtc Assuming the attacker captures the log-signing key only after causing some events to be logged, this should be fine, right? — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

RT @petertoddbtc: @rootkovska Though you have to be careful, because timestamp proofs don't prove uniqueness - attacker can timestamp fake… — PolitiTweet.org

Posted Nov. 26, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

@petertoddbtc Perhaps something that exposes itself as a syslog-like service, then time-stamps, signs (+encrypts?), and saves to a file? — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@LauriLoveX And how does Tahoe-LAFS achieved it? In one tweet? ;) — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@LauriLoveX And how do I implement it on a dropbox-like untrusted service? (Or git-hosting untrusted service)? — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

Hm, perhaps we can have both when using some kind of time-stamping service, e.g. the one @petertoddbtc recently ann… https://t.co/Ilq3s1gg7d — PolitiTweet.org

Joanna Rutkowska @rootkovska

@azonenberg I.e. we either must trust log-producing servers, or the log-keeping filesystem, right?

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@andydixon How does this compare to encfs? — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@azonenberg Not just network -- might also be dropped by the server implementing the filesystem keeping the logs. — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@azonenberg I.e. we either must trust log-producing servers, or the log-keeping filesystem, right? — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@azonenberg Sure. Your threat model is also very tempting, but I'm afraid we can't have both? — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@azonenberg Yes, of course. But in my case I assumed the servers to be trusted, and the fs where the logs are (e.g. Dropbox) untrusted. — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@azonenberg Of course it can. If you additionally use signed tags (git tag -s). — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@azonenberg Yes. If the last msg I see verifies ok, then I'm sure no previous message was lost. — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

@hanno Yeah, but git is hard when I'd like to set it on e.g. encfs-on-Dropbox and then have multiple (concurrently) pushing "users". — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

(Yes, I'm aware of journalctl FSS, but it requires a specialized server, and I want this usable with *any* fs) — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

Is there any logging software with forward integrity protection that could be used over an arbitrary fs (e.g. Dropbox)? — PolitiTweet.org

Posted Nov. 26, 2016
Profile Image

Joanna Rutkowska @rootkovska

Reverse re-assembly of your dinner: https://t.co/GJUy6TtG9s — PolitiTweet.org

Posted Nov. 25, 2016
Profile Image

Joanna Rutkowska @rootkovska

(And, admittedly, I'm one of those who fell into this fallacy also, years ago). — PolitiTweet.org

Posted Nov. 25, 2016