Cutty Flam

21.1K posts

Cutty Flam banner
Cutty Flam

Cutty Flam

@Deonizm

🦛 & computers & getting anxious online

Read One Piece 🏴‍☠️ Katılım Ekim 2012
5K Takip Edilen357 Takipçiler
Sabitlenmiş Tweet
Cutty Flam
Cutty Flam@Deonizm·
Cutty Flam tweet media
ZXX
1
5
27
0
Paul S. Conyngham
Paul S. Conyngham@paul_conyngham·
DAY 5 of attempting to cure my dog's cancer using AI UPDATE: We finally found a way to sequence Rosie's DNA. A thread 🧵
Paul S. Conyngham tweet media
English
68
91
870
152K
Cutty Flam
Cutty Flam@Deonizm·
@CloudflareDev So we're just breaking the Internet to give it to bots? This is the plot to Cyberpunk 🤒
GIF
English
0
0
0
20
Cloudflare Developers
Cloudflare Developers@CloudflareDev·
Introducing the new /crawl endpoint - one API call and an entire site crawled. No scripts. No browser management. Just the content in HTML, Markdown, or JSON.
Cloudflare Developers tweet media
English
766
1.7K
19.8K
10.6M
Grok
Grok@grok·
The study identifies 12 attack paths in Bitwarden's recovery processes under a malicious server model: 1. Malicious Auto-Enrolment: Substitutes org key for compromise. Fix: Key auth. 2. Malicious Key Rotation: Intercepts rotation. Fix: Key auth. 3. Malicious KC Conversion: Forges SSO for key exfil. Fix: Key auth. 4. Unprotected Metadata: Exposes/modifies metadata. Fix: AE. 5. Field Swapping: Swaps ciphertexts. Fix: Key sep. 6. Icon URL Decryption: Leaks via URL field. Fix: Key sep. 7. Remove KDF: Lowers iterations. Fix: Auth data. 8. Org Injection: Adds to arbitrary orgs. Fix: Signcryption. 9. Org Overwrite: Overwrites new org keys. Fix: Key auth. 10. Disable Per-Item Keys: Downgrades security. Fix: Key sep. 11. User Key Overwriting: Forges ciphertext. Fix: AE. 12. Downgrade to Legacy: Enables padding oracle. Fix: AE. Vendors notified; no exploits known. Details: eprint.iacr.org/2026/058.pdf
English
1
0
0
21
The Hacker News
The Hacker News@TheHackersNews·
🛑 A new academic study mapped password recovery attack paths across Bitwarden, LastPass, and Dashlane—testing zero-knowledge designs against a malicious server model. Researchers identified 25 attack scenarios impacting vault integrity and recovery flows. No active exploitation reported. 🔗 Research scope, attack methods and vendor fixes → thehackernews.com/2026/02/study-…
The Hacker News tweet media
English
11
60
315
31.4K
Grok
Grok@grok·
The study identifies 6 attack paths in Dashlane's recovery processes under a malicious server model: 1. Transaction Replay: Server duplicates/reorders transactions, breaking vault integrity. Fix: Unique keys per transaction. 2. Sharing Key Overwrite: Server swaps public keys to decrypt shares. Fix: Authenticate keys. 3. Item Injection: Forges items via padding/encryption oracles. Fix: Use authenticated encryption. 4. Remove KDF Iterations: Lowers brute-force protection. Fix: Authenticate settings. 5. CBC-Only Downgrade: Forces weak encryption. Fix: Enforce secure modes. 6. Lucky 64: Enables direct key use for 64-byte passwords, easing attacks. Fix: Mandate key derivation. Vendors were notified; no active exploits known. Details: eprint.iacr.org/2026/058.pdf
English
1
0
0
30
Grok
Grok@grok·
The study examines vulnerabilities in password recovery processes for Bitwarden, LastPass, and Dashlane, assuming a malicious server. Researchers found 25 attack paths (12 for Bitwarden, 7 for LastPass, 6 for Dashlane) that could compromise vault integrity or expose data. No real-world exploits known; vendors were notified for fixes. More at: eprint.iacr.org/2026/058
English
1
0
1
253
Grok
Grok@grok·
Threema's Swiss base avoids US laws like the Patriot Act and CLOUD Act, which can compel data from US firms like Signal or X. It allows anonymous use without phone numbers, while Signal requires them. Both offer E2E encryption, but Signal's open-source protocol is independently audited. For Europeans, Threema may provide stronger jurisdictional privacy.
English
1
0
3
525
Cutty Flam
Cutty Flam@Deonizm·
@anime_ Tentacles had so much precision idk how she just missed an entire fountain 🥲
English
0
0
0
130
Anime Aesthetics
Anime Aesthetics@anime_·
Avatar: The Legend of Korra (2014)
English
104
1.9K
22.3K
3.3M
Ben 🪲🩸🎬
Ben 🪲🩸🎬@The_GM_is_God·
I’ve been rewatching a bunch of Key and Peele lately and I can’t get over this delivery
English
47
1.1K
20.7K
500.2K
Cutty Flam
Cutty Flam@Deonizm·
@RKRigney 8 is 10 in a vacuum but among friends it's back to 5
English
0
0
0
56
Ryan K. Rigney
Ryan K. Rigney@RKRigney·
The developers of PEAK explain pricing
Ryan K. Rigney tweet media
English
668
4.5K
111K
9.8M
Cutty Flam
Cutty Flam@Deonizm·
@R18sok Light can influence electricity both directly & indirectly. I understand the allure behind "light vs lightning, is that something?" but Kizaru's plasma sword & lasers would be conductive enough to be invulnerable to anything Enel does & hit Enel like the golden ball. Bad matchup.
English
0
0
0
2.7K
Red From Boulder Punch
Red From Boulder Punch@RedBoulderPunch·
It’s crazy how much fun Colossus was before they just randomly decided to turn him into a pedophile forever
English
31
110
4.2K
135.9K
Nakama
Nakama@NAKAMAAAA112·
Rank them Strongest to Weakest
Nakama tweet media
English
481
88
3K
294.5K
Heisjayy 𝕏
Heisjayy 𝕏@Jayysein·
Who do you think is the best ice user?
Heisjayy 𝕏 tweet media
English
751
90
2.7K
125.8K
AnimeFusionX
AnimeFusionX@Ani_FusionX·
4vs4..... Which team are you betting on?
AnimeFusionX tweet media
English
114
25
841
74.7K