collin
342 posts


I stand by this as my best dotfile advice.
Thomas H. Ptacek@tqbf
Steal or write your dotfiles when you’re 17. Accrete lines over time; remove or edit rarely. The entries in your gradually expanding PATH like rings in a tree trunk. One day you may need your .profile to work on a SunOS 4.1.3 machine again, just wait.
English

@ZackKorman @IceSolst Enjoyable writeup. I feel the same way about the paperwork theater of compliance stuff. I felt slightly better when I accepted that security != compliance and just think of it as a different thing collingreene.com/compliance.html
English

Here’s a thread about how I approached getting ISO27001 certified at Pistachio, written for people who hate these things as much as I do. As @IceSolst says, ACAB includes auditors.
English

An excellent writeup of what makes data "sensitive" and what that means for security and privacy
strategicsec.substack.com/p/the-factors-…
English

@intoverflow Extremely cool. I've long harbored a dream of a coffee table hacking tales book with the benefit of full knowledge + hindsight of 10 interesting breaches or events or something. If this project is that, I want to read it even more!
English

Working on a new history project. A preview:
In 1988, a Cornell grad student releases his secret project — a worm — and quickly realizes he fucked up
So he asks his friend, US Olympic rower Andrew Sudduth, to anonymously send this note
From: foo@bar
To: TCP/IP mailing list

English

The differences between performing privacy and security work in a big company for my fellow computer security people.
collingreene.com/security_and_p…
I'm still newer to privacy work so this is my "most likely to be wrong" writeup, feedback welcome
English

Compliance is different from security: collingreene.com/compliance.html
English

@philvenables Agree with you.
A thing I haven't sorted yet, what is the optimal amount of compliance effort to spend, your post made me finish a post about that: collingreene.com/compliance.html
English

Regulatory Harmonization - Let’s Get Real
Most cybersecurity controls are already relatively aligned. The calls for action on harmonization are really problems induced by obligations from other technology risk domains or broader. In many cases, focusing on reducing compliance toil is the right approach.
philvenables.com/post/regulator…
English

@jeffvanderstoep Good writeup. Agree that vuln prevention > discovery > response.
Curious about
1. How is "old" vs "new" code designated?
2. How is a specific vuln connected to only old or new code? Or am I misunderstanding
3. No counterfactual here right? ex to find/fix vulns in the old code
English

I’m super excited about this blogpost. The approach is so counterintuitive, and yet the results are so much better than anything else that we’ve tried for memory safety. We finally understand why.
security.googleblog.com/2024/09/elimin…
English

@dinodaizovi I like this so much.
This fundamental uncomfortable truth then has weird side effects
1. Buy more snake oil products, because it can't hurt!
2. Use this compliance framework, to at least CYA
3. Build cool stuff, because its fun and pseudo-justifiable.
English


@swagitda_ Walking 1:1s when weather cooperates and under desk treadmill in this wfh world are both very pleasant
English

@IAmMandatory 'write a short story about a hacker in iambic pentameter'
Was a top 5 prompt for me today in messing around
English

@caseyjohnellis @ryanaraine @msuiche Ironically I don't understand twitter privacy so can't see this tweet but feel free to DM me if I can help
English

Thoughts on how to maximize success as an infosec team that needs to roll out changes people may not like -
collingreene.com/communicating_…
English

Shift left in 60 seconds - libber.org/shift_left_in_…
I've had success with shift left as a central strategy of infosec teams for the last n years and attempted a tl;dr of it without marketing fluff
English

@philvenables I think marketing has made it seem vague, imo its concretely about more security for less effort, earlier (thus less realized risk) and feedback loops to have all stages improve: libber.org/shift_left_in_…
English

@theharmonyguy I’ve listened to hours of the same song in because it’s what Apple Music plays when I plug my phone into the car. Amusing little routine of modern life
English

@ryanaraine Yeah, it might look a bit random but our Red Team X does security research on a bunch of things we might consider using. This turns into CVEs in software, firmware, hardware, consumer devices etc.
English

Why's the Facebook offensive security research team breaking into Schneider Electric PLC boxes? Or Airspan 4G access points? Such odd target choices.
engineering.fb.com/2022/07/20/sec…
English











