I left my MacBook on the plane and it was stolen. Iโve tracked it down to a flea market on south Atlanta. But while I know itโs in the building I donโt know where
The reason IT support people are so bitter is that YOU (I mean YOU) cannot rationally describe the problem:
You: The Internet is down
IT: How do you know the Internet is down?
You: I can't get email.
IT: Is it possible that the email servers are down and the Internet is working
Inflight wifi didn't work so of course I had to debug it. It appears the problem is lack of DHCP lease. The WiFi was using 8 hour leases, which was time enough for many planeloads of passengers to embark/disembark.
A quick ARP scan at the time showed there were 55 devices on the
Your regular reminder that once a big newsworthy event happens, you'll start seeing reports of similar incidents that have been happening all the time, just without being reported.
BREAKING: A NY tugboat captain has reported to
@gCaptain
โcontainer ship APL QINGDAO lost power while transiting New York harbor. They had 3 escort tugs but 3 more were needed to bring her under control. They regained power & were brought to anchor near the verrazano bridgeโ
Everyone: Telegram is encrypted.
Experts: Telegram IS NOT an encrypted messaging app
<CEO gets arrested>
News: Telegram is an encrypted messaging app.
Experts: Telegram IS NOT an encrypted messaging app.
You can't live debate crazy, they will always win.
Live debate is just performance art. Somebody will make some new claim nobody has heard of before, and it'll be impossible to refute without having the time to go research what they just said. "Samuelsson's study from late 2021
nVidia is in the same position as Sun Microsystems was in the early days of the dot-com bubble.
Sun had the leading edge web servers, the smartest engineers, the most respect in the industry. If you were dot-com startup, you bought Sun servers. Smart engineers wouldn't come work
It's kinda like how Elon Musk has promising Full Self Driving on Teslas for years without delivering, he's also failing at delivering civil war in Europe.
@_ColeMurray
How can I can for bluetooth signal strength? The MacBook has bluetooth enabled, my phone is talking to the bluetooth, but there's no strength meter.
1/n OK, let me explain what's going on with the Facebook right now.
First, let's talk "routing". The Internet is a mesh of routers that forward packets. Packets go from source through a series of routers until they reach their destination.
The US Naval laboratories have just announced that they've been able to fully replicate the LK-99 results. They've released this image of a sample floating above a magnet proving the Meissner effect.
For example, to prove my point, I opened the podcast () and skipped forward to a random location, around 37 minutes into the thing (I can't bear to watch all 3 hours and debunk point by point).
At this point, he's talking about a "Lazarus Report" that said
1/ In case you were wondering: Apple's replacement for Intel processors turns out to work really, really well. Some otherwise skeptical techies are calling it "black magic". It runs Intel code extraordinarily well.
@ErrataRob
They don't know terminology, they don't understand the why. From their perspective is where you should be looking.
Worker: "My email is down. I better call IT. I need to get my work done and I have a crucial meeting invite I need to send."
IT: "Yeah, the internet is down so
Cybersecurity expert here: no.
The stories of teenage hacking are sensationalized.
As far as we can tell, he didn't hack into the company using a FireTV stick. He accessed the company using his phone.
Specifically, he connected his phone to the TV and its bluetooth keyboard,
This simple tweet that I thought 10 people might notice has gone viral with 26 million views and counting. The consequence is that the Atlanta PD contacts me to file an official police report. That's kinda cool of them.
Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's no such thing. What they taught you is a lie, and they knew it was a lie, and they didn't care, because they are jerks.
I applied for "Community Notes" access 6months ago and was finally accepted today. I can therefore see the proposed community notes on Elon's posts like this.
There are three proposed notes. Two point to high quality sources debunking the notion that your tax dollars are paying
1/n
If you are wondering if there will be anybody at Mike Lindell's cybersymposium who can confirm or refute his "packet captures", well, there's going to be me. I'm a well-known expert on packet captures, and somewhat knowledgeable about election systems.
Note that "Wireshark" only captures non-promiscuous packets and broadcasts, things going in/out of my own machine, not anybody's private traffic.
You have enable monitor mode to see everything, and even then, that''s tough with MIMO.
I hate you Twitters. After ragging on RFKjr yesterday in a tweet that went viral, people claim "but his book is well researched and reasonable".
It's not.
I just bought the book, starting reading the introduction, and immediately come across a stumbling block. The highlight
79/
Final verdict of this "cyber expert":
Number of "packet captures" or "cyber pcaps" seen = 0
Amount of "Absolute Proof" seen = 0
Amount of any evidence seen = 0
@vanturd
It's stolen if somebody takes something that doesn't belong to them. That it's currently misplaced doesn't mean somebody can take it.
It's not "lost" -- you can take any Apple product to the nearest store and have it reunited with its owner.
I mean, I don't want to make a blanket statement like "trust experts", but it's been a long running argument with fans. Telegram has fans, and by "fans" I mean "batshit crazy fanatics who'd probably murder you if they could come to this country".
I forget to mention the subtext. The Vice article in question also contains written debunking of some of RFK's claims, and links to other written debunking of other claims.
The premise here is that RFK/Rogan are refusing a written response, and are demanding instead a live
It's RFK who refuses to debate.
Hotez linked to the Vice article thoroughly debunking RFK:
Rogan's/RFK's response isn't to write back, countering those things. His response is to demand a live debate.
And the live debate will contain just as many
@ErrataRob
If itโs a tool you use daily internet email or otherwise you should be able to be famioiar with the basics regardless of if someone taught you outright.
โMy hammer doesnt workโ coming out of a contractors mouth doesnt endear calm respect.
April "Fools Day" started from the Catholic tradition of breaking out into dance every April 1, a practice they still observe. Pope Francis demonstrated his moves this morning to reporters.
The following tweet is false. EVERY engineer in the real world makes a tradeoff between safety and cost. It's part of risk planning for any large project.
Lives are valued between about $2 million and $10 million. If it costs $20 million to reduce the number of lives lost in a
I help with the Order of the Engineer ceremony most semesters for our graduating seniors, and this is quite literally one of the things they take an oath to never ever do ๐ซ
It was a bit confusing for the poor guy contacting me, because he's told just to call this number with no context, without any idea why he's calling me. I don't know why precisely he's calling, and neither does he.
WHAT THE EFFING F!!! I don't understand anything about networks.
As you know, Google shook the beehive that is infosec by providing a .zip domain. The community has exploded in outrage over the fact that this makes a lot of phishing-style attacks easier.
This excellent post
What? Microsoft still using HTTP instead of HTTPS/SSL for produce updates? I wonder why.
i mean, updates are signed, so it's not inherently a security risk. But at the same time, layered protection etc.
I suspect it's because a lot of corps have firewalls that sometimes break
Statistically, your safe deposit box is more likely to be robbed by the FBI than bank robbers.
Not because they charged you of a crime.
Not because they suspected you of a crime.
They just come and take it.
And don't give it back.
The FBI raided Jeni Pearson's safe deposit box and tried to take all the contents using civil forfeiture. Jeni fought back, along with other
@IJ
clients, and won...
Except, when the FBI returned the box contents, $2,000 was missing. So Jeni and
@IJ
sued again.
Yesterday, we got
@VarminWay
RFK is the coward, refusing to write up a response to the written debunking of his statements.
He wants a forum where he can instead lie and mispresent things as much as he did on the Joe Rogan podcast.
If you send out a phishing email to test your employees, and 500 fail, it probably means something is wrong with your organization, not with the employees.
Thanks to
@ryanaraine
I'm now looking at the word list from which Wordle derives its word of the day. It's the list
@wordlinator
used to produce its spoilers. I'm guessing you all don't want me to post it, right?
So as I blogged before, the emails contained DKIM information, which the original reporters could and should have verified. So I eventually got a copy of the email and run DKIM verification on it. It passed:
We obtained a copy Hunter Biden's alleged laptop from
@RudyGiuliani
.
The email was independently verified by cybersecurity expert
@ErrataRob
, who used a cryptographic signature in the email's header to verify its authenticity with Google's servers.
@JaeronMerc
@ErrataRob
Itโs a lot like having a child. You very much have to take the knowledge base of the other person into consideration and a lot of computer guys do not do this at all.
But the lesson here is that I should've called them and filed a police report (I suppose by dialing 311) first thing. He asked why I didn't file a police report, and my answer was that I didn't really understand what I should do.
@Devon_Eriksen_
There is no "the Japanese". Different Japanese think differently. Just because Al Jazeera interviews an anti-American historian doesn't mean the rest of the Japanese feel that way.
If you actually go to Japan and see their Hiroshima museum, you'll find they describe many of the
I don't want a system that blocks incoming spam calls. I want a system that shunts them to an AI running on AWS that interacts with them and wastes their time.
Everyone in tech should watch this gut wrenching video because at some point this may be you. You should understand how business works going in so that you understand the process for when they push you out.
The underlying cause RIGHT NOW is likely the same problem that all tech
I love that she recorded this. I love that people get to see what these giant corporations are like.
From the human perspective, how could she ever improve with this feedback? I would be furious in her position. I've had to fire and lay off people, and I hope I did better.
Fact-check: no.
Hamas was the largest victor in the 2006 election with 44% of the vote, so not a "majority" back then. There hasn't been a vote since. The median age in Gaza is 18, meaning nearly half the population wasn't even born then. Moreover, half the population back then
Fact check: the majority of Palestinian people in Gaza elected Hamas, which ran on a kill-all-the-Jews platform; and it remains widely popular in Gaza.
You think your Thanksgiving is bad, my sister and her husband are arguing about best way to structure an SQL table/queries. So in order to bring harmony, I interrupted and suggested NoSQL/MongoDB instead.
So let's discuss SSL encryption algorithms for the moment. If you are using Chrome, you've got a choice between AES, Triple-DES, and ChaCha20. This pic shows the list that Chrome sends to web servers saying which algorithms it'll support.
Iโve exhausted all my options getting my laptop from the Mart. If anybody can get evidence itโs there - like a picture of the serial number, Iโll give a reward if I get it back. I have the (almost certain) store, it just canโt be me (Iโve already been there)
33/ This is incredibly frustrating. Lindell invited "cyber experts" and "fact checkers" to come and confirm the "packet captures" -- and has yet to provide us any packet captures and it's 4pm already.
#ReleaseThePacketCaptures
๐งต"Twitter 2.0" is trending.
I'm a foremost expert on this and let me tell you what you should do: quit, take the 3 month severance with your friends, and build the 2.0 version yourself. Musk will give up and buy your company in a couple years.
@d_feldman
If I had a chance to rewire my house, I'd also put 240v in a lot more places. But there's a plug for this, so that you get hot-hot instead of hot-neutral, depending upon how you plug in.
Lindell: "It was valid data from the 2020 election and nobody who came out of those [cyberexpert breakout rooms] can say anything different".
I was in the room. I say something different. None of it was valid 2020 election data.
49/ he called me a coward claiming I ran away โ Iโve been sitting here in front the entire time waiting for him to call me onstage to discuss the packet captures
From
@dildog
:
Click 'Tweet' in the web ui
F12 Remove 'disable' on the tweet button
Click it, and go to 'network', right click on the request and copy as cURL
Then, add &weighted_character_count=true as a param to the end of the url
Then, resubmit the tweet with curl.
In any event, status as of 7pm: laptop's last known location was still at a (probable) location at the Metro Mart USA, but now the laptop is either completely off or its battery is dead, I'm getting no further updates on its location.
Bill Gates is buying up the majority of American farmland and BlackRock is buying the majority of single family houses but I'm supposed to believe the biggest threat to us is Elon Musk buying Twitter?
8/ If you stop announcing the location of your prefix, well, then routers on the Internet stop forwarding packets to your network. They forget about you, and packets sent to you go nowhere.
Don't do that.
56a/ All day Mike Lindell has been on stage saying the cyber experts are happily working on packet captures.
We are not. We haven't been given the packet captures we were promised.
@Andr3jH
Obviously, if the plane flaps its wings hard enough, it can take off. That's what the "flaps" are for. People are so stupid that can't answer this.
Bullshit. There's no evidence 3 million toothbrushes performed a DDoS.
What the f*** is wrong with you people???? There are no details, like who is the target of the DDoS? what was the brand of toothbrushes? how are they connected to the Internet (hint: they aren't, they are