Sublime
An inspiration engine for ideas
Meta, Google, and Microsoft all use encryption built by the same 50-person nonprofit.
Zero revenue from 2 billion users. The founder uses a fake name. And when the FBI subpoenaed them, they only provided 2 pieces of data.
Here's how a non-profit secures the internet🧵
Alex Vaccax.com
Layers of protection.
Cybersecurity service. Archive work. https://t.co/xc4JmjulxY
Information security is like Tetris. Your successes disappear, but your failures do not.
Mikko Hyppönen • If It's Smart, It's Vulnerable
Telegram has been compromised for years. Signal has been compromised for years. ____ has been compromised for years.
Guy they arrested in France has been compromised for years.
Useful tools for sure, but don’t be naive.
John McAfee: there is no privacy___LINEBREA... See more
Ken Therouxx.comReading a tweet is a bit like downloading an (attacker-controlled) executable that you instantly run on your brain. Each one elicits emotions, suggests knowledge, nudges world-view.
In the future it might feel surprising that we allowed direct, untrusted information to brain.
Andrej Karpathyx.comWorking in information security is sometimes a bit like playing Tetris: your successes disappear but your failures accumulate. When information security works flawlessly, it is invisible. And rarely is anyone thanked for stopping a disaster that didn't happen.
Mikko Hyppönen • If It's Smart, It's Vulnerable
TL;DR
1. Do not reuse passwords.
2. Always use 2FA.
3. Update software all the time (especially the browser and OS).
4. Format your computer at least once a year.
5. Don't download executables via email and don't install pirated software.
6. Use a VPN.
Gabriel Gruber 𝚵x.com