Data Security
34 Threads
LNAFA Year in Review! We were happy to jump into the AFA research scene and have been grateful for the encouragement and support we've received over the past few months. Here's a...
@Jikkyleaks @profnfenton @jengleruk @OpenSAFELY @EMISHealth @artisbrutal2021 RE OpenSAFELY TPP: "NHS England🟰 data controller TPP🟰data processor 🗝️researchers on OpenSAFELY are ac...
1/ 𝐖𝐡𝐚𝐭 𝐢𝐬 #𝐒𝐡𝐲𝐟𝐭𝐍𝐞𝐭𝐰𝐨𝐫𝐤? 🌠 Picture it as your cosmic guide in the digital universe. It ensures the safe transfer of your data across both centralized (#CeFi) and decentralized...
ChatGPT says it won't write ransomware. It will. 🧵 https://t.co/AXhZjLRmuL
If I had to start learning Data Engineering in 2023, I’d follow this plan, mostly in order:💡 ✔️ Learn SQL and database programming ✔️ Learn how to design & implement data models...
I gave GPT-4 all the info I have about a startup: - All of my sloppy meeting notes - Bullet points extracted from emails w founder - Deck data extracted by AI - parts of the AI ge...
The stuff uncovered in the Twitter whistleblower report is much crazier than anything in the "Twitter files" but it's much less politically/tribally salient so it got no attention....
🧵1/ Smart cities with privacy in mind are impossible to accomplish. Anyone who pitches that idea is either stupid [naive] or lying. If you can program personal identification data...
[1/4] There is a lot of talk about “Merkle tree proof-of-reserve” systems Lets just do a quick refresh of the technical side of this Technically, there is no need to involve a Me...
A deep dive into the tech behind #Jasmy and how it works Does it have the right fundamentals to succeed? Let's explore and discover that in today's thread 🧵 #Jasmy #jasmyusdt @ja...
30 cybersecurity search engines for researchers: 1. Dehashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—...
(1/19) Cryptography Basics: Polynomial Erasure Codes Moving data across the internet is difficult; assuming you trust all the intermediate parties, you still have vicious network...
(1/13) KZG Commitments Part 2: Open Previously, we committed to our data by evaluating a polynomial using an elliptic curve. Now, it's time to test that commitment; it's time for...
/1 How do we generate unique IDs in distributed systems? How do we avoid ID conflicts? The diagram below shows 5 ways. 👇 https://t.co/heA5cXZPcy
⚠️⚠️⚠️ crypto projects inadvertently leak information through discord ⚠️⚠️⚠️ here's a few ways to apply @tree_of_alpha and @GCRClassic style sleuthing to get ahead in this bear m...
How to keep your HTTP Cookies secure. Thread🧵
A Gmail hack to find out who is selling your data:
Insightful presentation from @HoonKimATC - CTO of @AstarNetwork - for module 3 of #unitmasters program. "Basics of consensus mechanisms"💡 "Not your server, not your data", @yip...
How you can protect your AADHAR CARD! ——THREAD——
The Most Important PVC in Zero Trust Architecture is People, Also Required for ZTA is the PAM Module in SecHard! People are one of the most important circle in data security. Rese...
Why people are concerning the Privacy and Security in the digitalization society? Because AI feeds on data, and companies gather the data from customer databases, historical tran...
A simple guide to understanding Blockchain A Thread🧵
Phone-tracking firm Anomaly Six has amassed so much app data it recently held an incredible closed-door demonstration: The company geofenced the CIA and NSA, tracked someone who ha...
In 2010, WikiLeaks released a classified document. A list of infrastructure critical to U.S national security. The government listed a Trans-Atlantic cable. 3 years ago, 19-ye...