고정된 트윗
Kate Pearce
16.4K posts

Kate Pearce
@secvalve
Recovering pentester, security pragmatist. Head of security at a place, many other hats. 👩🏽💻🏳️🌈 Personal views. @[email protected]
Wellington City, New Zealand 가입일 Haziran 2010
4.1K 팔로잉4.4K 팔로워
Kate Pearce 리트윗함

@rossjanderson Professor Ross Anderson, FRS, FREng Dear friend and treasured long term campaigner for privacy and security, Professor of Security Engineering at Cambridge University and Edinburgh University, Lovelace Medal winner, has died suddenly at home in Cambridge.

English

@herbertbos Can’t find the details as it is from years ago, but I reference one here.
Kate Pearce@secvalve
There was that other time someone published on MPTCP in 2016 and claimed their work was completely novel. Apparently BlackHat wasn’t “legit” enough to cite as a real source.
English

@herbertbos My Blackhat talks had several academic papers come out a year or so later each claiming it was “novel” and “not yet documented”. They practically copied my diagrams and didn’t reference my talk.
English

@andrewtychen She absolutely could beat you up.
But, she would never need to fight.
You would take one look and you would never start it.
She finishes fights by never needing to start them.
English

@AlanJ_KA7 “It sounds like carrots might actually be fruit in this case. Attackers are known to innovate and work to evade traditional definition methodologies.”
English
Kate Pearce 리트윗함

@taramcallister4 But the “potential savings” of $3.70 if you fly seven hours after you need to be there and/or stay 45km away. The potential savings!!!1!
English

@grogersxyz There is a reason the phrase “as much as the market can bear” exists….
English

Stuff is asking for whinging landlords to complain about increased costs while the treasury reveals that the main factor driving increases in rents isn’t increased costs, it’s hoarding and greed i.stuff.co.nz/stuff-nation/1…
English
Kate Pearce 리트윗함
Kate Pearce 리트윗함

Dropping #Downfall, exploiting speculative forwarding of 'Gather' instruction to steal data from hardware registers. #MeltdownSequel
- Practical to exploit (POC/Demo)
- Defeat all isolation boundaries (OS, VM, SGX)
- Bypass all Meltdown/MDS mitigations.
downfall.page
GIF
English
Kate Pearce 리트윗함

Where @dotMudge makes an important point at @SummerC0n: real data on ATOs shows that SMS 2FA is fine for the vast majority of users. It prevented 100% of 3.3B automated password stuffing attacks, 96% of 12M bulk phishing, and even 76% of <10k targeted attacks seen over last year.

English

“Machine Unlearning” sounds like a joke, but it’s a very real thing that has huge value if we can figure it out: ai.googleblog.com/2023/06/announ…
English

@secvalve I feel quite strongly that allowing your developers access to production data is a larger risk than implementing a bug in production that might expose the data
English









