/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Dino A. Dai Zovi

@dinodaizovi
59 posts
2025-11-12
This is incredibly neat! https://blog.google/... AI won't reach it's true potential for our society unless it's truly private to the end-user. Few can run advanced models on their own hardware, so this is strategically important technology.
2025-11-12 View on X
The Verge

Google unveils Private AI Compute, a cloud platform providing a “secure, fortified space” to run AI tools on devices, similar to Apple's Private Cloud Compute

Google says Private AI Compute maintains privacy while tapping cloud resources.

2025-10-27
So... why is X throwing away all of the public keys previously stored for enrolled security keys?
2025-10-27 View on X
PCMag

X prompts users to re-enroll their security keys for 2FA, and will lock accounts that are not updated by Nov. 10, allowing it to retire the Twitter.com domain

If you're using a hardware security key as your two-factor authentication (2FA) method on X, you'll need to re-enroll by Nov. 10 or your account will be locked.

2025-09-10
There have been various debates about how to improve memory safety with some advocating for rewriting all critical software in newer programming languages. I believed that would take too long and updating CPUs, lang runtimes, and compilers ships faster:👇 https://security.apple.com/...
2025-09-10 View on X
The Verge

Apple says the iPhone 17 and iPhone Air have Memory Integrity Enforcement, “industry-first, always-on memory safety protection”, like Microsoft and Google offer

Memory Integrity Enforcement is always-on safety protection designed to make life harder for spyware developers.

2025-08-09
Maybe we should be talking more about how many companies seemingly don't do *any* reference checks on new hires?
2025-08-09 View on X
Wired

Leaked spreadsheets, Slack messages, and files linked to an alleged group of North Korean IT scammers show how they track potential jobs and record earnings

A new cache of data—emails, spreadsheets, Slack messages—reveals how meticulously they plan and track job applications, earnings, and day-to-day work life X: Dino A. Dai Zovi / @di...

2025-03-01
Security nihilism grows from being in a reactive response-only mode for too long. Security optimism grows from focusing on applied security engineering. Be the house that didn't burn down because you invested in applying security engineering to prevent entire classes of attack.
2025-03-01 View on X
TechCrunch

Amnesty International says Google has fixed three zero-day vulnerabilities in Android, developed by Cellebrite and used by Serbia to unlock phones

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools.

2024-07-21
Good time to re-read “CyberInsecurity: The Cost of Monopoly” by Dan Geer et al: https://www.schneier.com/...
2024-07-21 View on X
Wall Street Journal

A profile of CrowdStrike, founded in 2011 and used by 300 companies in the Fortune 500; Gartner: CrowdStrike has ~15% of the global security software market

The unending need to cut cost (at all cost) to improve “metrics” that have nothing to do with creating sustainable, quality results... Yeah, it's bleak. … Phil Stevens / @phil_stev...

Good time to re-read “CyberInsecurity: The Cost of Monopoly” by Dan Geer et al: https://www.schneier.com/...
2024-07-21 View on X
The Official Microsoft Blog

Microsoft estimates that CrowdStrike's update affected 8.5M Windows devices, or less than 1% of all Windows machines

On July 18, CrowdStrike, an independent cybersecurity company, released a software update that began impacting IT systems globally.  Although this was not a Microsoft incident …

2024-07-20
Good time to re-read “CyberInsecurity: The Cost of Monopoly” by Dan Geer et al: https://www.schneier.com/...
2024-07-20 View on X
Wall Street Journal

A profile of CrowdStrike, founded in 2011 and used by 300 companies in the Fortune 500; Gartner: CrowdStrike has ~15% of the global security software market

The little-known company is very popular in Corporate America, contributing to the severity of the global IT outage

2024-05-28
Apple seems to be more mature in deciding what to apply AI to compared to rushing in only to have it tell people to do dangerous things like run off of cliffs, cook with gasoline, eat glue, etc.
2024-05-28 View on X
Bloomberg

A closer look at Apple's AI strategy: Project Greymatter, local and cloud LLM data processing, Siri, sealing a chatbot partnership deal with OpenAI, and more

Though Apple's first set of modern AI features won't be as impressive as rival offerings, the company is betting that its massive customer base can give it an edge.

2024-05-27
Apple seems to be more mature in deciding what to apply AI to compared to rushing in only to have it tell people to do dangerous things like run off of cliffs, cook with gasoline, eat glue, etc.
2024-05-27 View on X
Bloomberg

A closer look at Apple's AI strategy: Project Greymatter, local and cloud LLM data processing, Siri, sealing a chatbot partnership deal with OpenAI, and more

Though Apple's first set of modern AI features won't be as impressive as rival offerings, the company is betting that its massive customer base can give it an edge.

2022-10-10
“In addition, one thing should be noted that the key pairs required by BootGuard during provisioning stage is also included in the leaked content [...] Let's pray for Lenovo didn't use any of those keys in the production (Prove us wrong!)!” https://hardenedvault.net/...
2022-10-10 View on X
Tom's Hardware

Intel confirms its proprietary UEFI code appears to have been leaked by a third party; the Alder Lake BIOS source code was leaked to 4chan and GitHub

Hack's perpetrator and origins remain unknown.  —  We recently broke the news that Intel's Alder Lake BIOS source code had been leaked …

2022-08-17
It's a testament to Signal's design that a Twilio breach only allows an attacker to assume a target account's phone number (which also notifies all conversations of their new safety number) and doesn't compromise *any* data. Good proactive security designs prepare for breaches. https://twitter.com/...
2022-08-17 View on X
TechCrunch

Signal says attackers accessed the phone numbers and SMS verification codes for around 1,900 users as part of the recent Twilio breach

just reasons I don't understand. Can somebody explain those reasons to me? https://twitter.com/... Joseph Menn / @josephmenn : Every time there is a high-end attack on a critical e...

2022-03-13
It's almost always insecure configuration and almost never an 0day. https://twitter.com/...
2022-03-13 View on X
Reuters

Sources: NSA and other agencies are investigating an attack that disabled Viasat's satellite internet service in Europe on February 24 as Russia invaded Ukraine

2022-01-11
End of an era! This would be an amazing gig for whomever they end up choosing. https://twitter.com/...
2022-01-11 View on X
Signal Blog

Signal CEO Moxie Marlinspike steps down; WhatsApp co-founder Brian Acton will act as the interim CEO as the search for a permanent replacement begins

It's a new year, and I've decided it's a good time to replace myself as the CEO of Signal.  —  I have now been working on Signal for almost a decade.

2021-11-15
The big question is: if someone noisy was able to compromise this infra to send out these e-mails, were silent others able to compromise the infra to *monitor* e-mails? https://twitter.com/...
2021-11-15 View on X
BleepingComputer

FBI email servers were hacked to send spam warning of a “sophisticated chain attack”, with a likely goal to discredit security researcher Vinny Troia

The Federal Bureau of Investigation (FBI) email servers were hacked to distribute spam email impersonating FBI warnings …

Now imagine if this were abused by a more advanced actor to send out an *especially* convincing spear phish... https://twitter.com/...
2021-11-15 View on X
BleepingComputer

FBI email servers were hacked to send spam warning of a “sophisticated chain attack”, with a likely goal to discredit security researcher Vinny Troia

The Federal Bureau of Investigation (FBI) email servers were hacked to distribute spam email impersonating FBI warnings …

Now imagine if this were abused by a more advanced actor to send out an *especially* convincing spear phish... https://twitter.com/...
2021-11-15 View on X
Krebs on Security

The person claiming responsibility for the FBI email server hack says they were able to send spam messages by abusing insecure code in the FBI's LEEP portal

even with how silly it was written AND not following protocol — was NOT the weird juju I wanted going into this weekend. https://krebsonsecurity.com/ ... https://twitter.com/... @e...

2021-11-14
The big question is: if someone noisy was able to compromise this infra to send out these e-mails, were silent others able to compromise the infra to *monitor* e-mails? https://twitter.com/...
2021-11-14 View on X
BleepingComputer

FBI email servers were hacked to send spam warning of a “sophisticated chain attack”, with a likely goal to discredit security researcher Vinny Troia

The Federal Bureau of Investigation (FBI) email servers were hacked to distribute spam email impersonating FBI warnings …

2021-11-04
It's been a good idea for years to assume that TLS and other encrypted traffic/data is being recorded to be decrypted in the future when quantum computers bring it within reach: https://www.technologyreview.com/ ...
2021-11-04 View on X
MIT Technology Review

How US agencies are preparing for “post-quantum cryptography” against attackers who harvest sensitive data now for decryption in the future

The US government is starting a generation-long battle against the threat next-generation computers pose to encryption. Tweets: @techreview , @techreview , @aarongrunwald , @statec...

2021-10-18
“The attack could have been isolated, but many sections of the Sinclair IT network were interconnected through the same Active Directory domain, allowing the attackers to reach broadcasting systems for local TV stations.” https://therecord.media/...
2021-10-18 View on X
The Record

In an SEC filing, Sinclair confirms it suffered a ransomware attack that disrupted its channels on Sunday; Sinclair initially blamed technical issues

Sinclair formally confirmed the ransomware attack a day after this initial report in SEC documents.  Original reporting below. Source: Business Wire .