πš‚πšŽπšŒπš πŸΆπš—πš” π™΅πš˜πš› πš†πš˜πš›πš”πšπš›πš˜πšžπš™πšœ 3.11 Profile picture
Security For Workgroups (3.11) in Seattle. BOFH til I sipped from the Cup of Mgmt, now GRC-aaS. I use Twitter ironically. Not a CISSP. He/him. πŸ‡ΊπŸ‡ΈπŸ‡¬πŸ‡§
Dec 15, 2017 β€’ 16 tweets β€’ 15 min read
Dear #ISP and #internet & #tech companies.

Now that the #netneutrality vote has happened, here are my rules as a #consumer and #Customer that I will use to decide who gets my dollar bills.

(thread) 1>$ I will be subscribing to the services and providers who voluntarily maintain the closest model of #netneutrality.

If @Comcast starts charging for prioritized services, I will not only opt for the cheapest and most basic plan possible...
Nov 7, 2017 β€’ 12 tweets β€’ 3 min read
Holy crap. Gemalto's IDPrime.NET cards - the ones they tout being Windows native compatible - are suscept. to factorization. 1) Researchers have found a process to duplicate a PRIVATE key just from the PUBLIC key. This is big.

And cheap, for a 1024bit key.