ℂ𝕪𝕣𝕚𝕝

1.2K posts

ℂ𝕪𝕣𝕚𝕝 banner
ℂ𝕪𝕣𝕚𝕝

ℂ𝕪𝕣𝕚𝕝

@Liryc_2

Cybersecurity student | Web3 SR • Believes in @syntrei | building secure systems, one exploit at a time. Join https://t.co/DJhpgEfTyV

The Matrix 👾 Katılım Şubat 2024
219 Takip Edilen147 Takipçiler
Elorm Daniel
Elorm Daniel@elormkdaniel·
Windows is better than Linux
English
60
7
63
9.2K
JADE
JADE@0xjade·
20 with 5yrs in security experience
JADE tweet media
English
12
1
34
925
Titanium
Titanium@akinkunmi·
According to a particular religion, my son who is only two weeks old, has never said a word, quite literally incapable of hurting anyone, can't make decisions and only relies on instincts, that boy is SOMEHOW a sinner????
English
100
4
168
347.2K
JADE
JADE@0xjade·
There’s still Hope
JADE tweet media
English
5
2
28
481
JADE
JADE@0xjade·
Hey siri : how can I make 6 figures from security audits Siri : follow @0xjade
JADE tweet media
English
6
1
24
794
𝗩𝗶𝗰𝘁𝗼𝗿_𝗧𝗵𝗲𝗢𝗿𝗮𝗰𝗹𝗲
If you are a junior auditor or researcher just starting out, this is probably familiar. You open a repo. Hundreds of files. No clear entry point. At some point you ask yourself: “How am I supposed to approach a manual audit?” This thread is the answer I wish I had early on.
English
11
23
218
8.1K
Defiboy
Defiboy@defiboyszn·
Hi
QST
4
0
6
102
ℂ𝕪𝕣𝕚𝕝 retweetledi
JADE
JADE@0xjade·
I actually wish I did. Web3 security is one thing that shouldn’t be sold like hype. There are tons of real professionals putting out knowledge for free, no hard feelings. But what really matters is showing your actual work who you’ve audited, what reports you’ve written instead of selling a “crypto security” course built on random numbers and surface-level takes. Web3 auditing is delicate. It’s not just running tools and calling it a day. It’s understanding how one small oversight can cost millions. So if you’re teaching it, show the portfolio. Show the audits. Show the responsibility behind the title. Thank you
English
0
1
1
27
ℂ𝕪𝕣𝕚𝕝
ℂ𝕪𝕣𝕚𝕝@Liryc_2·
@0xjade That's a call for more efficient security measures that can adapt to seamless user experience. Another gap in the market. Nice ome Jade 👏
English
0
0
0
8
JADE
JADE@0xjade·
One of the number-one issues in applying security frameworks is the tension between user experience (UX) and maximum security, especially during implementation and integration. Security frameworks such as ISO 27001, NIST, or CIS Controls are designed to reduce risk, but when applied rigidly, they often introduce friction into systems. Controls like multi-factor authentication, strict access controls, frequent password rotations, session timeouts, and approval workflows can slow down users, interrupt productivity, and create frustration. When security measures feel obstructive, users are more likely to bypass controls, reuse passwords, share credentials, or rely on insecure workarounds ironically increasing overall risk. Another challenge lies in integration with existing systems and workflows. Many organizations operate legacy systems or complex architectures that were not designed with modern security frameworks in mind. Forcing “maximum security” controls into such environments can lead to poor usability, system instability, or operational inefficiencies. This often results in partial adoption of the framework, misconfiguration, or checkbox compliance rather than meaningful security. From a human-centric perspective, security frameworks frequently prioritize technical controls over user behavior. However, users are a critical part of the security chain. If the framework does not align with how users actually work, it creates resistance instead of cooperation. Security then becomes seen as a blocker rather than an enabler. The core issue, therefore, is not that security frameworks are flawed, but that maximum security without usability is unsustainable. Effective security requires a risk-based, context-aware approach that balances protection with usability. Frameworks must be adapted not blindly enforced to ensure security controls are strong, usable, and realistically integrated into daily operations. In practice, the most successful implementations are those that treat security as a design problem, not just a technical one embedding security into workflows in a way that users can adopt naturally without compromising protection.
English
5
2
8
235
ℂ𝕪𝕣𝕚𝕝
ℂ𝕪𝕣𝕚𝕝@Liryc_2·
Like I promised, I built a static malware analyzer from scratch. PE parsing, string extraction, YARA scanning, risk scoring—clean CLI. Open-source soon. Blue team grind never stops. Let's goo!!!
English
0
0
2
31
ℂ𝕪𝕣𝕚𝕝
ℂ𝕪𝕣𝕚𝕝@Liryc_2·
Three days till my exams are finally over, this means I can finally be active in X once again, missed the community and all the insights I'd have gotten, but everything happens for a reason, am I right? My new year officially begins in March 🥲 See y'all on Friday!!
English
0
0
1
18
JohnnyTime 🤓🔥
JohnnyTime 🤓🔥@RealJohnnyTime·
Sugery went well 💪🏻 Now recovering 🤞
JohnnyTime 🤓🔥 tweet mediaJohnnyTime 🤓🔥 tweet media
English
52
1
206
5.9K
playboi.eth
playboi.eth@adeolRxxxx·
If you live in America, you don’t know how lucky you are in this tech field. Really
English
39
61
890
47.8K