Data Security
25 Threads
The stuff uncovered in the Twitter whistleblower report is much crazier than anything in the "Twitter files" but it's much less politically/tribally salient so it got no attention....
[1/4] There is a lot of talk about “Merkle tree proof-of-reserve” systems Lets just do a quick refresh of the technical side of this Technically, there is no need to involve a Me...
A deep dive into the tech behind #Jasmy and how it works Does it have the right fundamentals to succeed? Let's explore and discover that in today's thread 🧵 #Jasmy #jasmyusdt @ja...
30 cybersecurity search engines for researchers: 1. Dehashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—...
(1/19) Cryptography Basics: Polynomial Erasure Codes Moving data across the internet is difficult; assuming you trust all the intermediate parties, you still have vicious network...
(1/13) KZG Commitments Part 2: Open Previously, we committed to our data by evaluating a polynomial using an elliptic curve. Now, it's time to test that commitment; it's time for...
/1 How do we generate unique IDs in distributed systems? How do we avoid ID conflicts? The diagram below shows 5 ways. 👇 https://t.co/heA5cXZPcy
⚠️⚠️⚠️ crypto projects inadvertently leak information through discord ⚠️⚠️⚠️ here's a few ways to apply @tree_of_alpha and @GCRClassic style sleuthing to get ahead in this bear m...
How to keep your HTTP Cookies secure. Thread🧵
A Gmail hack to find out who is selling your data:
Insightful presentation from @HoonKimATC - CTO of @AstarNetwork - for module 3 of #unitmasters program. "Basics of consensus mechanisms"💡 "Not your server, not your data", @yip...
How you can protect your AADHAR CARD! ——THREAD——
The Most Important PVC in Zero Trust Architecture is People, Also Required for ZTA is the PAM Module in SecHard! People are one of the most important circle in data security. Rese...
A simple guide to understanding Blockchain A Thread🧵
Phone-tracking firm Anomaly Six has amassed so much app data it recently held an incredible closed-door demonstration: The company geofenced the CIA and NSA, tracked someone who ha...
In 2010, WikiLeaks released a classified document. A list of infrastructure critical to U.S national security. The government listed a Trans-Atlantic cable. 3 years ago, 19-ye...
What are Zero Knowledge Proofs (ZKPs), and how are they changing blockchain forever? How can they be utilized in the real world? Let’s dive in👇 1/15
Do you want to solve the SARS2 origin? I have some questions we need answers to: 1.Why was the public database with 20,000 viral sequences maintained by the Wuhan Institute of Vi...
1/ The future of the browser 🧵 Right now, Web 3 wallets like MetaMask plug into DeFi applications. In the future, they’ll plug in to every website in the world.
DynamoDB's a full-managed service, but this does not protect you from 𝗵𝘂𝗺𝗮𝗻 𝗲𝗿𝗿𝗼𝗿 Losing your customer's data can be the end of your business 🔥 Small thread about helping you sle...
So Facebook is for sale now? 😳 https://t.co/8kIdh5BcEI
Everyone from soccer moms to global CEOs relies on data storage. We use data storage to back up our kids’ photos, our medical records, banking records, credit card information, and...
"Buckets" are containers for storing data in cloud storage. It often happens that, due to inattention of the owners, "buckets" that contain personal data end up in the public doma...
Did you know that S3 offers object locks that protect data from being deleted? It helps you to protect very valuable data or fulfill compliance rules 🧵👇 https://t.co/dtWP5Nfxt4