Sublime
An inspiration engine for ideas
I worked directly on DPRK's biggest bridge hack ever (Ronin), helped track BSC bridge hackers off-chain, and was at Apple in the security team at the time of the Pegasus spyware so I consider myself somewhat of an expert here. I'd recommend the
team to do the following asap: 1) Hop on a call with
2) Get new laptops + ledgers
... See moreWe must harness this unstoppable wave of digital money—the Internet of Value—to advance greater economic inclusion, financial and economic freedom, and human aspiration for generations to come.
J. Christopher Giancarlo, Cameron Winklevoss, • CryptoDad: The Fight for the Future of Money
In those physics, NotPetya reminds us, distance is no defense. Every barbarian is already at every gate. And the network of entanglements in that ether, which have unified and elevated the world for the past twenty-five years, can, over a few hours on a summer day, bring it to a crashing halt.
Andy Greenberg • Sandworm
2025 Data Breach Investigations Report
The 2025 Data Breach Investigations Report analyzes over 12,000 breaches, highlighting trends in threats, vulnerabilities, and the impact of third-party involvement on cybersecurity across various industries.
verizon.comThis is the story of a rather unorthodox department known as M.D.1. (Ministry of Defence 1). Born at the War Office early in 1939 with a staff of one commissioned and one non-commissioned officer charged with the task of devising special weapons for irregular warfare, it rapidly grew up into an establishment equipped to design and develop new weapo
... See moreStuart Macrae • Winston Churchill's Toyshop
A single breakthrough by Room 40 cryptanalysts had succeeded where three years of intensive diplomacy had failed.