/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@cybergibbons

@cybergibbons
13 posts
2021-05-14
We truly have entered a post-truth, post-science era. People with huge followings just invent stuff to be lapped up and parroted again and again. https://twitter.com/...
2021-05-14 View on X
The Verge

Elon Musk says Tesla no longer accepts bitcoin for vehicle purchases due to its environmental cost, will look at more environmentally friendly cryptocurrencies

Tesla has stopped accepting bitcoin as payment for its cars out of concern that it will contribute to greater consumption of fossil fuels …

2021-05-13
We truly have entered a post-truth, post-science era. People with huge followings just invent stuff to be lapped up and parroted again and again. https://twitter.com/...
2021-05-13 View on X
The Verge

Elon Musk says Tesla no longer accepts bitcoin for vehicle purchases, due to its environmental cost, will look at more environmentally friendly cryptocurrencies

Tesla has stopped accepting bitcoin as payment for its cars out of concern that it will contribute to greater consumption of fossil fuels …

2021-05-10
Just to add some context to this - @ghidraninja has managed to gain SWD access to the nRF52832 system-on-chip on the AirTags. This has internal flash that stores the firmware of the device. @colinoflynn had already pulled the external SPI flash chip contents. https://twitter.com/...
2021-05-10 View on X
9to5Mac

A German security researcher claims he was able to break into the microcontroller of Apple's AirTag, allowing him to modify its NFC URL

The Apple AirTag has been released almost ten days ago.  Since then, we have seen a user rebuilding an AirTag as a thinner card that fits into wallets …

2020-11-24
I can't work out if this “backdoor” is remotely exploitable (WAN or cloud)... I hate the term “RCE” when it comes to devices like this. From what perspective do you mean “remote”? https://cybernews.com/...
2020-11-24 View on X
CyberNews

Researchers find actively-exploited backdoors in low-cost Jetstream and Wavlink routers sold at Walmart, Amazon, and eBay

what you need to know Anthony Spadafora / TechRadar : These routers might give hackers a back door into your home network Tweets: @curtisschin : Underscoring that cheap can be cost...

2020-05-02
The blog is whataboutism and denial at it's finest. There are two types of data they gather. We can exclude “Syncing of user browsing data”, none of us have signed up and syncing is off. https://twitter.com/...
2020-05-02 View on X
CNET

Xiaomi defends its data practices, says it collects aggregated data that can't be used to identify users and syncs browsing history if data sync is turned on

even if it is wrong! — without doing any basic scrutinizing. For anyone following the Xiaiomi story, read @cybergibbons' excellent tweet thread on the matter. https://twitter.com/....

Firstly, I and several others have re-confirmed the findings today, across multiple devices. There is no doubt that the Mint Browser sends search terms and URLS whilst in Incognto mode.
2020-05-02 View on X
CNET

Xiaomi defends its data practices, says it collects aggregated data that can't be used to identify users and syncs browsing history if data sync is turned on

even if it is wrong! — without doing any basic scrutinizing. For anyone following the Xiaiomi story, read @cybergibbons' excellent tweet thread on the matter. https://twitter.com/....

So we have “Collection of aggregated usage statistics data”. This makes no sense. They mention data “such as system information, preferences, user interface feature usage, responsiveness, performance, memory usage, and crash reports”. Then give an example of COLLECTING A URL.
2020-05-02 View on X
CNET

Xiaomi defends its data practices, says it collects aggregated data that can't be used to identify users and syncs browsing history if data sync is turned on

even if it is wrong! — without doing any basic scrutinizing. For anyone following the Xiaiomi story, read @cybergibbons' excellent tweet thread on the matter. https://twitter.com/....

There is a massive gap here. They list data they gather, not including URLS, and then they gather URLs. More to the point, there is NO client-side aggregation. They attach a UUID to my requests which persists over at least 24 hours.
2020-05-02 View on X
CNET

Xiaomi defends its data practices, says it collects aggregated data that can't be used to identify users and syncs browsing history if data sync is turned on

even if it is wrong! — without doing any basic scrutinizing. For anyone following the Xiaiomi story, read @cybergibbons' excellent tweet thread on the matter. https://twitter.com/....

So, Xiaiomi have published a blog, which I think aims to refute what myself, @hookgab and @iblametom are presenting. http://blog.mi.com/... Let's tear it down.
2020-05-02 View on X
CNET

Xiaomi defends its data practices, says it collects aggregated data that can't be used to identify users and syncs browsing history if data sync is turned on

even if it is wrong! — without doing any basic scrutinizing. For anyone following the Xiaiomi story, read @cybergibbons' excellent tweet thread on the matter. https://twitter.com/....

The only thing they have actually said is false is gathering data in Incognito, which they do. The rest of it is fluff. Padding. Pick another fight Xiaomi.
2020-05-02 View on X
CNET

Xiaomi defends its data practices, says it collects aggregated data that can't be used to identify users and syncs browsing history if data sync is turned on

even if it is wrong! — without doing any basic scrutinizing. For anyone following the Xiaiomi story, read @cybergibbons' excellent tweet thread on the matter. https://twitter.com/....

2020-03-25
Everyone knows that I am a strong advocate for privacy. But I'd never considered something like COVID-19 happening. What do people think about using mobile metadata to monitor movement in exceptional circumstances? https://twitter.com/...
2020-03-25 View on X
Idle Words

During the pandemic, we should use “surveillance economy” infrastructure to trace contacts with location data, enforce self-quarantine, aid health authorities

Maciej Ceglowski / Idle Words :

2020-02-05
Important to note this is not a hardware backdoor. You can use a HiSilicon chip and not use this software. Axis and Hikvision are not vulnerable AFAIK. https://twitter.com/...
2020-02-05 View on X
ZDNet

Researcher details a backdoor in Huawei-owned HiSilicon chips used in millions of smart devices, including security cameras, that has been active since 2013

Researcher said he did not notify HiSilicon due to a lack of trust in the hardware vendor to adequately fix the issue.

2019-12-21
This is such a good example of a problem that every in infosec knew about, we just sucked at communicating it to everyone else. https://twitter.com/...
2019-12-21 View on X
New York Times

Reporters identified a Secret Service agent, his home address, family details, and tracked Trump's movements using the leaked dataset obtained by the NYT

IF YOU OWN A MOBILE PHONE, its every move is logged and tracked by dozens of companies.  No one is beyond the reach of this constant digital surveillance.