John Scott-Railton

1.6K posts

John Scott-Railton banner
John Scott-Railton

John Scott-Railton

@jsrailton

Chasing digital badness. Sr. Researcher @citizenlab @UofT @munkschool. Fmr.Ed. @SecPlanner. Tweets mine. Other platforms @jsrailton too.

Beigetreten Ocak 2011
2.8K Folgt164.7K Follower
John Scott-Railton
John Scott-Railton@jsrailton·
Articles hit at the sweet spot for people using LLMs to turn tweets into essays. Not only was our attention span already precarious, but suddenly long text = takes more time to read it than it did to write it. Now, we need need a summary feature to fix this.
Nikita Bier@nikitabier

We’re rolling out summaries for Articles now. Just tap the Summarize button if you want to know if it’s worth your time to read it (or if your attention span is 12 seconds).

English
2
0
13
3.3K
John Scott-Railton
John Scott-Railton@jsrailton·
NEW: French sailor reveals position of aircraft carrier with his fitness app. Run tracking app @Strava shows Charles de Gaulle as it steams across the Med. #stravaleaks strike..again! Story by @lemonde. 1/
John Scott-Railton tweet mediaJohn Scott-Railton tweet media
English
45
286
1.6K
199.2K
John Scott-Railton
John Scott-Railton@jsrailton·
7/ But wait, isn't the movement of something like an Aircraft Carrier not a big secret...yes..sort of. And this particular deployment isn't a secret. But consider: (a) this case is diagnostic of an unauthorized use problem (b) navies know the traditional ways they are watched with satellites etc. But they can only do deceptive maneuvers etc when they know what they are focused on. And they do deception to confuse these systems all the time. They know when satellites pass, know what to show on their deck etc etc. (c) Strava emits some useful signals: For example, someone is probably not jogging around the deck when a carrier is doing flight ops or prepping for them. It also indicates things about what might be happening based on that persons role: when they are jogging, they aren't manning their other role in the Combat Information Center...etc etc x.com/jsrailton/stat…
English
1
2
13
2K
John Scott-Railton
John Scott-Railton@jsrailton·
@lemondefr @Strava 6/ Many such cases. Unbelievable sloppiness around location data & private devices. Reason that militaries that are in a lot of active big conflicts learn to keep personal phones away from sensitive locations. x.com/Helene_G_du_P_…
Hélène du .P Menagé (Fernández)@Helene_G_du_P_M

@jsrailton @Strava @lemonde During a NATO training exercise in Norway we located the positions of US troops who were playing the enemy by triangulating their Tinder locations in the middle of the Arctic forest where there were no nearby towns or cities.

English
3
3
49
8.3K
John Scott-Railton
John Scott-Railton@jsrailton·
However, those satellites only pass at specific times, known to navies. Very limiting. *Long history of navies purposefully making maneuvers to deceive satellite observers.* Everything emitted is a signal. But you can only defend against the ones you know about The bigger issue is that fitness trackers & other mobile location data are a flow of high time & location precision that is not controlled for.
English
2
0
6
790
John Scott-Railton
John Scott-Railton@jsrailton·
It's true. But it's also true that every signal about the movement of a ship is useful. Satellites, shipspotting, AIS transponders etc.. Each gives something. But is also dependent on other things like satellite pass timing etc. And those are things that are adjusted for and taken into consideration. This is simply another data flow that is undesirable and seemingly impossible to stop...
English
0
0
9
1.3K
Zack Korman
Zack Korman@ZackKorman·
@vxunderground They use PR firms. So the news agencies know these firms so whenever they need a quote or a clip on cyber they ask who the firm has and they go “here is Joe McCybersecurity”
English
2
0
56
2.1K
vx-underground
vx-underground@vxunderground·
I am genuinely impressed by mainstream media outlets ability to find absolute nobodies in cybersecurity. It's remarkable. I am often left speechless. There has been dozens occasions, especially as of recent, where some media outlet will be like, "Today as a special guest is world-renowned cybersecurity expert and ethical hacker Joe McCyberSecurity". I'm like, who the fuck is Joe McCybersecurity? I've been doing cybersecurity and malware stuff for a long time and I've never once seen or heard of Joe McCybersecurity. If he is world-renowned, I would THINK I would have seen them or heard of them. The camera then pans over to Joe McCybersecurity and it is the most generic cookie cutter white dude in a cheap suit and the tag below him will say something like, "Joe McCybersecurity, Ethical Hacker, CEO of Cybersecurity McJoe Industries" I'm like, "Cybersecurity McJoe Industries? What the fuck is that?". I look it up and it's a generic WordPress website hosted on GoDaddy with an expired SSL cert. Joe McCybersecurity then babbles incomprehensible nonsense for about 60 seconds until the TV host goes "woaw" and it cuts to a commercial. Absolute cinema.
English
118
149
2.3K
87K
Paul Asadoorian @paulasadoorian@infosec.exchange
We found 9 vulnerabilities across 4 low-cost IP-KVM vendors. These $30 devices give attackers the equivalent of physical access to everything they connect to. Below the OS, EDR, and pretty much every security control you've deployed.
Paul Asadoorian @paulasadoorian@infosec.exchange tweet media
English
16
55
278
32.1K
Workshop Labs
Workshop Labs@WorkshopLabs·
Letting a provider see all your data is the price of admission for AI. We're changing that. Introducing Silo, the first private post-training and inference stack for frontier models, with hardware-level guarantees that we can’t see your data. Privacy without compromises. 🧵
Workshop Labs tweet media
English
17
35
247
35.5K
John Scott-Railton
John Scott-Railton@jsrailton·
@wdormann @signalapp Yeah. And in a sense it reveals how deceptions work. The best con artists are always warning people to be vigilant about ...con artists.
English
0
0
1
83