Vulnerability annihilation since 1851
"What Hobbs had in mind was not the usual cajoling of a provincial bank into an upgrade, but exposing weaknesses in the British Empire itself by revealing the faults of one of Day and Newell’s competitors."
Information Asymmetry and the 1950s Nuclear Bounty
Props to Matt Ploessel for calling out this one... I'd not heard of a bounty around nuclear weapons until today.
Are you making a Walkman? Or an iPod?
When the walkman was introduced, it created a category. It's brand also became the term of description for that category.
The Nth Country Experiment and Coincident Vulnerability Discovery
Nth Country Experiment - Nuclear MuseumCould any country with the right knowledge and technology build a nuclear bomb? From May
Public Comment from Casey Ellis, Bugcrowd re DRAFT BOD 20-01
Dear Director Krebs and CISA/DHS team,
Thank you for the opportunity to comment on this Binding Operational Directive...
WTF is happening on tcp:0? 2020 edition - Update 1
tl;dr: 0.06% of the publicly-addressable IPv4 space is listening to and responding on TCP Port 0. Why? idk…
Changes
You know that awkward thing at the moment when you see someone and go to shake their hand or hug
On #stopthespread and school closures
On the decision to keep schools open in Australia yesterday:
It’s not that kids don’t catch covid. It
The Future is Now: 2020 Cybersecurity Predictions
How is it 2020 already? We’re in the last month of the decade, and the year that has long
Mastering the mundane
I live a pretty frenetic and busy life both activity-wise and mentally. Some of this is environmental, most of this is my own making, and almost all of it I love… But it’s important to be reminded to appreciate the simple and sometimes boring things too.