GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Eleanor Saitta (dymaxion@infosec.exchange), page 2

  1. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Sunday, 02-Feb-2025 11:19:23 JST Eleanor Saitta Eleanor Saitta

    I guess it's a nice distraction from everything else being shit to get an Android security update that completely breaks my house audio distribution system in a way that's going to require hardware purchases to fix.

    Phones were an even bigger mistake than the web was.

    In conversation about 5 months ago from infosec.exchange permalink
  2. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Sunday, 02-Feb-2025 09:36:47 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Paul Cantrell

    @inthehands
    It's not a digital coup. It's just a coup.

    In conversation about 5 months ago from infosec.exchange permalink
  3. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Friday, 31-Jan-2025 03:29:04 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Lesley Carhart :unverified:

    @hacks4pancakes
    Honestly, I'm not going to believe someone when they say they do it. If they say they try and then want to talk about the ways in which they know they fail and the places where they probably have blind spots? Yeah, maybe. But I've seen too many "progressive" employers where the pipeline ends in a dumpster of broken glass.

    Like, to the point where I'm genuinely unsure about the ethics of working to improve the pipeline when even most of the best folks are forced out of the industry by 35.

    In conversation about 5 months ago from infosec.exchange permalink
  4. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Wednesday, 22-Jan-2025 23:15:34 JST Eleanor Saitta Eleanor Saitta
    in reply to

    So, there seems to be a lot of uncertainty and a lack of clear efficacy around TransRescue right now. I'm looking for alternate orgs to suggest, but there's nothing else in exactly that space.

    In conversation about 6 months ago from gnusocial.jp permalink
  5. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Wednesday, 22-Jan-2025 02:20:41 JST Eleanor Saitta Eleanor Saitta
    in reply to

    If you at all can, this is a really great time to donate or otherwise assist with https://transrescue.org/

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: transrescue.org
      Trans Rescue - Trans Rescue
      from Annie
      We help trans*, intersex, and other people flee places where it is dangerous to be trans.We help them reach places of safety and reasonable quality of life.We do so legally and securely I’m in the US or UK And Want Help Planning To Leave If you are in the USA, the UK, or another country … Continue reading →
  6. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Tuesday, 21-Jan-2025 22:57:11 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Rich Felker
    • Kate Temkin

    @ktemkin
    One of the things I hope we can strongly agree on is that the place where we should be asking a lot more is at the library and language level. I agree it's implausible that small teams will fix annoying and subtle bugs and also do the basic security design work they're already not doing. However, it seems equally unlikely that people are going to stop doing dumb shit like connect things to the internet that really shouldn't be. Teaching the entire world how systems work to a level that allows them to have good intuition about what's a safe action is as hard as getting all the small dev teams to do the work. And harassing either users or devs about things outside of their scope of effective control of dumb and mean.

    So that means we need language, framework, and library issues fixed at those levels, and then we need shaping incentives like liability to force migrations and rewrites, once we have meaningful solutions. When we get to that point, yes, a lot of small teams will need to end of life products or accept that they're going to need to write a lot less code — but at least they won't be playing whack-a-mole with problems further up stack and above their pay grade.
    @dalias

    In conversation about 6 months ago from gnusocial.jp permalink
  7. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Tuesday, 21-Jan-2025 21:27:06 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Kate Temkin

    @ktemkin
    We talk about these things because we have spent literally the last twenty years looking at threat models and at the failure of overworked dev teams to build good code with bad tools. It will be an amazing victory for the community when developers have to actually design the bugs that fuck them over. And no, the correct way to fix these issues has never been to write bad code and then try to audit it, obviously.

    Yes, in the context of each individual program, the threat model wins. In the context of the entire industry, this is not how progress is made.

    In conversation about 6 months ago from infosec.exchange permalink
  8. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Tuesday, 21-Jan-2025 21:26:29 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Kate Temkin

    @ktemkin
    I think there are two different categories here. System design needs to be evaluated in the context of a threat model, yes (and a lot of what gets called a threat model is at best a colloquial approximation of actual thinking), but basic vulnerabilities, whether that means parser and state machine issues, memory issues, or issues of incorrect implementation of a chosen set cryptographic primitives, all qualify as "done badly" in most cases and insecure in the majority of foreseeable threat models if they're in reachable code.

    "Has an open port connected to the internet" implies a minimum set of things that must be accounted for in a threat model, as is "supports messaging between users".

    In conversation about 6 months ago from infosec.exchange permalink
  9. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Tuesday, 21-Jan-2025 20:02:35 JST Eleanor Saitta Eleanor Saitta

    So, cis Americans, you're now living through the first day of a federal genocide against trans people, as defined by the Lemkin Institute for the Prevention of Genocide. As happens almost without exception unless stopped, it is both likely to proceed to mass murder and to expand to include additional social groups, possibly including you.

    What are you going to do about this? Are you going to take up arms and fight to prevent your friends and neighbors from being murdered by the state? Are you going to harbor fugitives, get them medical care, and help them leave the country? Are you going to disrupt the function of state offices and destroy records to make their work impossible?

    Or are you just going to hunker down and go along with what's asked of you, in hopes they don't get around to killing people like you? Are you, in other words, going to be a good Nazi?

    If you think you're going to maybe go on a few big nonviolent protests and be angry on social media, like you did last time, but you know money is tight and you just started a new job and... congrats on failing to understand the situation and choosing to be a good Nazi.

    History is unfortunately quite clear here. There are no other options left. Either you literally, physically fight this, or you collaborate.

    If you think this is extreme, well, you've made your choice. See you in hell.

    In conversation about 6 months ago from infosec.exchange permalink
  10. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Monday, 20-Jan-2025 23:17:08 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Quinn Norton

    @quinn
    I mean, I've been imagining that since I was like eight and listening to the INF treaty negotiations, if not younger.

    In conversation about 6 months ago from infosec.exchange permalink
  11. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Monday, 20-Jan-2025 19:16:30 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Quinn Norton

    @quinn
    Bold of you to suggest we'll have organized schools where teaching this kind of minutiae will be deemed worthwhile in a hundred years

    In conversation about 6 months ago from infosec.exchange permalink
  12. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Saturday, 18-Jan-2025 09:46:52 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Trammell Hudson
    • Walter van Holst
    • Quinn Norton
    • Raphaël Vinot

    @rafi0t
    Or perhaps we should say, Quíñ.
    @quinn @whvholst @th

    In conversation about 6 months ago from infosec.exchange permalink
  13. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Wednesday, 15-Jan-2025 21:03:45 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Michał "rysiek" Woźniak · 🇺🇦

    @rysiek
    Honestly, this is the first I've heard of it, and hopefully the last. If it's even dumber in other ways too.... Yeah. Lolsigh.

    In conversation about 6 months ago from gnusocial.jp permalink
  14. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Wednesday, 15-Jan-2025 20:31:06 JST Eleanor Saitta Eleanor Saitta

    Could people just stop trying to "improve" things they don't understand?

    https://soatok.blog/2025/01/14/dont-use-session-signal-fork/

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: i0.wp.com
      Don’t Use Session (Signal Fork)
      from Soatok
      Last year, I outlined the specific requirements that an app needs to have in order for me to consider it a Signal competitor. Afterwards, I had several people ask me what I think of a Signal fork c…
  15. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Thursday, 09-Jan-2025 22:09:33 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Lesley Carhart :unverified:
    • Rich Felker
    • N3tN3rd 🥅🤓 Find Me @ http://netnerdnetwork.com

    @dalias
    Idk, I have pretty strong feelings about not inviting queer folks to have a nice time in a country that kills queer folks, even if the folks one invites are gonna be safe themselves. It's pretty colonialist, if you're going there for that reason.
    @n3tn3rd @hacks4pancakes

    In conversation about 6 months ago from infosec.exchange permalink
  16. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Thursday, 09-Jan-2025 21:59:27 JST Eleanor Saitta Eleanor Saitta

    Do (software) emulators/VMs exist for Sharc DSPs? How performant are they on, say, modern macOS ARM?

    In conversation about 6 months ago from infosec.exchange permalink
  17. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Thursday, 09-Jan-2025 19:36:08 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Lesley Carhart :unverified:
    • Rich Felker
    • N3tN3rd 🥅🤓 Find Me @ http://netnerdnetwork.com

    @dalias
    Yeah, I have bad news for you about the reality of queer rights in Nepal. The rhetoric is good and the tourist experience is ok, and that's about as far as it goes.
    @n3tn3rd @hacks4pancakes

    In conversation about 6 months ago from infosec.exchange permalink
  18. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Wednesday, 08-Jan-2025 04:02:11 JST Eleanor Saitta Eleanor Saitta

    Having just read a bit about the impact of the "business as usual" bias among German Jews in the runup to WW2 and the lack of meaningful resistance that it led to, is pretty terrifying watching the same bias today.

    In conversation about 6 months ago from infosec.exchange permalink
  19. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Monday, 06-Jan-2025 20:31:29 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Lesley Carhart :unverified:
    • Rich Felker
    • N3tN3rd 🥅🤓 Find Me @ http://netnerdnetwork.com

    @dalias
    I mean, it's also wildly insane from a climate perspective to fly the entire security community to Nepal? We shouldn't be flying nearly as much as it is — doing it much much more is an unserious suggestion.
    @n3tn3rd @hacks4pancakes

    In conversation about 6 months ago from infosec.exchange permalink
  20. Embed this notice
    Eleanor Saitta (dymaxion@infosec.exchange)'s status on Monday, 06-Jan-2025 19:39:43 JST Eleanor Saitta Eleanor Saitta
    in reply to
    • Lesley Carhart :unverified:
    • Rich Felker
    • N3tN3rd 🥅🤓 Find Me @ http://netnerdnetwork.com

    @dalias
    I have bad news for you about the availability of conference facilities in hotels (there are some! At least a half dozen credible options as long as you're under 1k people and can book the whole hotel! Let's move RSA there!)
    @n3tn3rd @hacks4pancakes

    In conversation about 6 months ago from infosec.exchange permalink
  • After
  • Before

User actions

    Eleanor Saitta

    Eleanor Saitta

    Thinking about security, failure, change, art, and living. Recruiting barbarians; complicate your narratives. Fractional CISO to startups via Systems Structure Ltd. HEL/NYC/LON

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          92115
          Member since
          26 Jan 2023
          Notices
          175
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.