Deleted tweet detection is currently running at reduced capacity due to changes to the Twitter API. Some tweets that have been deleted by the tweet author may not be labeled as deleted in the PolitiTweet interface.

Showing page 99 of 151.

Profile Image

Joanna Rutkowska @rootkovska

@AndreaBarisani Right. Today. Like there is no on-SoC memory, today :) — PolitiTweet.org

Posted Oct. 24, 2016
Profile Image

Joanna Rutkowska @rootkovska

@AndreaBarisani Well, if TZ bootrom AND memory is going to be inside SoC, then it's no longer user-controllable or user-audit-able, is it? — PolitiTweet.org

Posted Oct. 24, 2016
Profile Image

Joanna Rutkowska @rootkovska

Sounds reasonable, although I'd prefer the TZ memory to be discrete, outside of the SoC. We don't want TZ to evolve… https://t.co/q9rsL3AKjd — PolitiTweet.org

Andrea Barisani @AndreaBarisani

My initial thoughts on ARM TrustZone susceptibility Drammer (ARM Rowhammer) attacks: https://t.co/8D43AuS2Xv

Posted Oct. 24, 2016
Profile Image

Joanna Rutkowska @rootkovska

RT @AndreaBarisani: My initial thoughts on ARM TrustZone susceptibility Drammer (ARM Rowhammer) attacks: https://t.co/8D43AuS2Xv — PolitiTweet.org

Posted Oct. 24, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

A reminder that GPS PRN codes are not (crypto) integrity-protected. Just like most source code you download from… https://t.co/lBZaLhXtiT — PolitiTweet.org

Posted Oct. 24, 2016
Profile Image

Joanna Rutkowska @rootkovska

RT @vvdveen: My paper on deterministic rowhammer attacks on mobile devices is now public! https://t.co/XtNiZ4pNNF — PolitiTweet.org

Posted Oct. 24, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

@ZombBi @ProfanityIM Does it allow to separate the network-and-protocol-parsing code from the crypto code? — PolitiTweet.org

Posted Oct. 24, 2016
Profile Image

Joanna Rutkowska @rootkovska

@MarioVilas I think I need to add Neuromancer to my reading list then :) — PolitiTweet.org

Posted Oct. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

@timb_machine I'm sure that if animals had literature, human beings would be portrayed as nightmare too :( — PolitiTweet.org

Posted Oct. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

So, perhaps we all got "Matrix" backwards? Maybe it will be *us* who'll build Matrix to restrain AI? And Neo & Trinity will be... programs? — PolitiTweet.org

Posted Oct. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

Or Matrix, maybe? ;) https://t.co/hrLYoAlJlm — PolitiTweet.org

アルミ @schrotthaufen

@rootkovska What about providing fake sensory input? Kinda like The Truman Show for AI?

Posted Oct. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

@timb_machine Hm... Actually, why dystopian? — PolitiTweet.org

Posted Oct. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

@okayultra And who would be to judge this? — PolitiTweet.org

Posted Oct. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

@dakami They sure are, but here I'm more interested in the ethical side. And I'm saying this seriously :) — PolitiTweet.org

Posted Oct. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

I was only half-joking.. As/if Siri-likes became smarter, would it be unethical to cut them from most sensory input… https://t.co/oXS7jZFl1p — PolitiTweet.org

Joanna Rutkowska @rootkovska

Ethical Sandboxing for your personal AI assistant? #FutureInITSec

Posted Oct. 23, 2016
Profile Image

Joanna Rutkowska @rootkovska

RT @attractr: Gavin MacFadyen lived a meaningful life dedicated to truth and justice. He was a friend. Terribly sad. Signing off. https://t… — PolitiTweet.org

Posted Oct. 22, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

@mricon Much better question. — PolitiTweet.org

Posted Oct. 22, 2016
Profile Image

Joanna Rutkowska @rootkovska

@mricon Also, the more camouflaged: "How did you get started with computers?". This my fav, hear about 1024 times each time I'm at a con :/ — PolitiTweet.org

Posted Oct. 22, 2016
Profile Image

Joanna Rutkowska @rootkovska

@mricon Beverage maybe not that often, mostly from reporters, conference organizers (especially in non-western countries), etc. Mucho legit. — PolitiTweet.org

Posted Oct. 22, 2016
Profile Image

Joanna Rutkowska @rootkovska

RT @SarahCAndersen: https://t.co/PgNRJTcJpV — PolitiTweet.org

Posted Oct. 22, 2016 Retweet
Profile Image

Joanna Rutkowska @rootkovska

Ethical Sandboxing for your personal AI assistant? #FutureInITSec — PolitiTweet.org

Posted Oct. 22, 2016
Profile Image

Joanna Rutkowska @rootkovska

Two decades ago I was able to impress people when navigating using Palm Pilot with (discrete) GPS. Today: using paper map and compass. — PolitiTweet.org

Posted Oct. 22, 2016
Profile Image

Joanna Rutkowska @rootkovska

@subgraph Do you guys maintain a security page with a list of advisories/bulletins for Subgraph OS? Do you (intend to) write such bulletins? — PolitiTweet.org

Posted Oct. 22, 2016
Profile Image

Joanna Rutkowska @rootkovska

I think this is wrong, in so many ways. https://t.co/6oxeqMAxJl — PolitiTweet.org

granick @granick

Sessions on how to get along in a man’s world — how to speak, body language — are very popular at #GHC16. Reality, unfortunately.

Posted Oct. 20, 2016 Deleted after 6 years
Profile Image

Joanna Rutkowska @rootkovska

RT @0x6d696368: @rootkovska $100k to compromise my Android may not be worth it, but at 100k+ devices you break even at $1 asset value per d… — PolitiTweet.org

Posted Oct. 20, 2016 Retweet Deleted
Profile Image

Joanna Rutkowska @rootkovska

@mkolsek ...and because simple laws like those from Dino are impractical, which I argue here, securing things remains an ART. @dinodaizovi — PolitiTweet.org

Posted Oct. 20, 2016
Profile Image

Joanna Rutkowska @rootkovska

@mkolsek Absolutely. But we can't throw infinite resources and sacrifice everything to rise the cost. We need trade-offs. @dinodaizovi — PolitiTweet.org

Posted Oct. 20, 2016
Profile Image

Joanna Rutkowska @rootkovska

So, the @dinodaizovi's "law" might be true, but one needs to know "all the facts about the universe" in order to meaningfully evaluate it :) — PolitiTweet.org

Posted Oct. 20, 2016
Profile Image

Joanna Rutkowska @rootkovska

(2/) But defenders often can't know the exploit's "market" value dropped significantly. They continue to guesstimate the value incorrectly. — PolitiTweet.org

Posted Oct. 20, 2016
Profile Image

Joanna Rutkowska @rootkovska

E.g. even the most challenging exploit, once developed (and deployed) suddenly becomes much cheaper to use another time. (1/) — PolitiTweet.org

Posted Oct. 20, 2016