GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Eleanor Saitta (dymaxion@infosec.exchange)

  1. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Wednesday, 14-May-2025 19:48:40 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Greg Bell
    • evacide

    @ferrix
    There's good money to be made being part of the problem
    @evacide

    In conversation about 2 days ago from infosec.exchange permalink
  2. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Wednesday, 14-May-2025 16:32:01 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Kevin Beaumont

    @GossiTheDog
    Do you know how security works at scale? This isn't news and among the majors, MS was mostly late to the party. That said, "spies" is doing a lot of work here. If you mean "collaborates specifically around threat intelligence", sure. If you mean "provides the US with general purpose intelligence outside the digital security space above and beyond the cooperation that the US can compel with statutory powers", no, we have no reason to believe that.

    Also, with CISA dead, it's unclear that anyone on the USG side is still listening.

    In conversation about 3 days ago from infosec.exchange permalink
  3. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Thursday, 10-Apr-2025 05:08:06 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Lesley Carhart :unverified:

    @hacks4pancakes
    I would like to be fucking wrong more often. I am very tired of being right

    In conversation about a month ago from infosec.exchange permalink
  4. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Saturday, 22-Mar-2025 03:59:30 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Paul Cantrell
    • LukefromDC

    @inthehands

    @LukefromDC

    In conversation about 2 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/201/948/256/012/963/original/e648258648b09a3c.jpg
  5. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Saturday, 22-Mar-2025 03:55:41 JST Eleanor Saitta Eleanor Saitta
    • Paul Cantrell
    • LukefromDC

    @LukefromDC
    Si vis pacem, para bellum
    @inthehands

    In conversation about 2 months ago from infosec.exchange permalink
  6. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Tuesday, 11-Mar-2025 04:26:19 JST Eleanor Saitta Eleanor Saitta

    "We're happy to announce version 1.0 of the Torment Nexus, as popularized by the science fiction book 'Don't Invent the Torment Nexus'! Our innovative product breaks new ground in..."

    https://www.theguardian.com/technology/2025/mar/08/vr-prison-california

    In conversation about 2 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: i.guim.co.uk
      ‘An ideal tool’: prisons are using virtual reality to help people in solitary confinement
      from Abigail Glasgow
      Participants view scenes of daily life as well as travel adventures – then process the emotions they trigger through art
  7. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Wednesday, 19-Feb-2025 08:26:36 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Paul Cantrell

    @inthehands
    We did, the NTSB.

    I assume it'll be dead soon.

    In conversation about 3 months ago from infosec.exchange permalink
  8. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Saturday, 15-Feb-2025 22:30:49 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Lesley Carhart :unverified:

    @hacks4pancakes
    I struggle with this *because* the industry has changed so much. My way in is unrecognizable today, and I genuinely don't understand a lot of the traps that junior folks are dealing with because I've never seen them. I worry about steering folks the wrong way.

    In conversation about 3 months ago from infosec.exchange permalink
  9. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Sunday, 09-Feb-2025 04:29:34 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Quinn Norton

    @quinn
    Which Sullivan?

    In conversation about 3 months ago from infosec.exchange permalink
  10. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Thursday, 06-Feb-2025 22:52:22 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Michael Martinez :verified:

    @michael_martinez
    Well, the evangelicals are horny for revelations anyway — that's why they care about Israel and have so many folks inside the USAF Global Strike Command, so they can make sure the world ends in fire

    In conversation about 3 months ago from infosec.exchange permalink
  11. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Thursday, 06-Feb-2025 18:47:27 JST Eleanor Saitta Eleanor Saitta

    With the "shutdown" of USAID, the State department has ordered an emergency evacuation of all staff from over a hundred countries by Saturday. In their wake they will leave massive chaos. USAID feeds 53 million people a year, among other things. Many, many people are dying because of this, and many countries will never trust the US again.

    USAID is a major part of American international soft power. The damage that this is causing can only be described as treasonous, even ignoring the human cost.

    To be clear, this evacuation is impossible. Doing it from one country is very hard. Doing it everywhere all at once, even with all available military airlift assets, cannot happen. Regardless, on whatever schedule they do do this, this is not a normal international move. They are telling staff who in some cases have been in country for decades or who expected to be their for the rest of their careers that they have 48 hours to pack suitcases and leave everything else they own behind, to return to a country where they have no where to live and no job.

    But then, that's the point.

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments


  12. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Sunday, 02-Feb-2025 11:19:42 JST Eleanor Saitta Eleanor Saitta
    in reply to

    Context: you used to be able to cast the full screen on Android and when you locked the phone, it would just keep sending audio. Power usage was surprisingly low, and on a closed network, it's not really a big worry otherwise. Originally I used the Chromecast audio, and then a regular Chromecast with an audio extractor or a Wiim box. Now, when you lock your phone it stops casting. There are other options to get some individual apps to send audio data to the Chromecast with big caveats (Spotify loses track volume normalization, for instance), but nothing if you want everything without having to switch things manually. SonoBus will probably work, but now I need to buy new hardware to run it on if I want it independent of my laptop and running straight into the mixer.

    In conversation about 3 months ago from infosec.exchange permalink
  13. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Sunday, 02-Feb-2025 11:19:23 JST Eleanor Saitta Eleanor Saitta

    I guess it's a nice distraction from everything else being shit to get an Android security update that completely breaks my house audio distribution system in a way that's going to require hardware purchases to fix.

    Phones were an even bigger mistake than the web was.

    In conversation about 3 months ago from infosec.exchange permalink
  14. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Sunday, 02-Feb-2025 09:36:47 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Paul Cantrell

    @inthehands
    It's not a digital coup. It's just a coup.

    In conversation about 3 months ago from infosec.exchange permalink
  15. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Friday, 31-Jan-2025 03:29:04 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Lesley Carhart :unverified:

    @hacks4pancakes
    Honestly, I'm not going to believe someone when they say they do it. If they say they try and then want to talk about the ways in which they know they fail and the places where they probably have blind spots? Yeah, maybe. But I've seen too many "progressive" employers where the pipeline ends in a dumpster of broken glass.

    Like, to the point where I'm genuinely unsure about the ethics of working to improve the pipeline when even most of the best folks are forced out of the industry by 35.

    In conversation about 4 months ago from infosec.exchange permalink
  16. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Wednesday, 22-Jan-2025 23:15:34 JST Eleanor Saitta Eleanor Saitta
    in reply to

    So, there seems to be a lot of uncertainty and a lack of clear efficacy around TransRescue right now. I'm looking for alternate orgs to suggest, but there's nothing else in exactly that space.

    In conversation about 4 months ago from gnusocial.jp permalink
  17. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Wednesday, 22-Jan-2025 02:20:41 JST Eleanor Saitta Eleanor Saitta
    in reply to

    If you at all can, this is a really great time to donate or otherwise assist with https://transrescue.org/

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: transrescue.org
      Trans Rescue - Trans Rescue
      from Annie
      We help trans*, intersex, and other people flee places where it is dangerous to be trans.We help them reach places of safety and reasonable quality of life.We do so legally and securely I’m in the US or UK And Want Help Planning To Leave If you are in the USA, the UK, or another country … Continue reading →
  18. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Tuesday, 21-Jan-2025 22:57:11 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Rich Felker
    • Kate Temkin

    @ktemkin
    One of the things I hope we can strongly agree on is that the place where we should be asking a lot more is at the library and language level. I agree it's implausible that small teams will fix annoying and subtle bugs and also do the basic security design work they're already not doing. However, it seems equally unlikely that people are going to stop doing dumb shit like connect things to the internet that really shouldn't be. Teaching the entire world how systems work to a level that allows them to have good intuition about what's a safe action is as hard as getting all the small dev teams to do the work. And harassing either users or devs about things outside of their scope of effective control of dumb and mean.

    So that means we need language, framework, and library issues fixed at those levels, and then we need shaping incentives like liability to force migrations and rewrites, once we have meaningful solutions. When we get to that point, yes, a lot of small teams will need to end of life products or accept that they're going to need to write a lot less code — but at least they won't be playing whack-a-mole with problems further up stack and above their pay grade.
    @dalias

    In conversation about 4 months ago from gnusocial.jp permalink
  19. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Tuesday, 21-Jan-2025 21:27:06 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Kate Temkin

    @ktemkin
    We talk about these things because we have spent literally the last twenty years looking at threat models and at the failure of overworked dev teams to build good code with bad tools. It will be an amazing victory for the community when developers have to actually design the bugs that fuck them over. And no, the correct way to fix these issues has never been to write bad code and then try to audit it, obviously.

    Yes, in the context of each individual program, the threat model wins. In the context of the entire industry, this is not how progress is made.

    In conversation about 4 months ago from infosec.exchange permalink
  20. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Tuesday, 21-Jan-2025 21:26:29 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Kate Temkin

    @ktemkin
    I think there are two different categories here. System design needs to be evaluated in the context of a threat model, yes (and a lot of what gets called a threat model is at best a colloquial approximation of actual thinking), but basic vulnerabilities, whether that means parser and state machine issues, memory issues, or issues of incorrect implementation of a chosen set cryptographic primitives, all qualify as "done badly" in most cases and insecure in the majority of foreseeable threat models if they're in reachable code.

    "Has an open port connected to the internet" implies a minimum set of things that must be accounted for in a threat model, as is "supports messaging between users".

    In conversation about 4 months ago from infosec.exchange permalink
  • Before

User actions

    Eleanor Saitta

    Eleanor Saitta

    Thinking about security, failure, change, art, and living. Recruiting barbarians; complicate your narratives. Fractional CISO to startups via Systems Structure Ltd. HEL/NYC/LON

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          92115
          Member since
          26 Jan 2023
          Notices
          167
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.