CISO at @sardineai. Treasurer of @OWASP Board of Directors. (he/him) qatta' mIghtaHghach.

Phoenix, AZ
Joined July 2009
Filter
Exclude
Time range
-
Near
Me now, when I get an alert to update my software
GIF
Uhhh, interesting choice for a coupon code from Uber Eats.
1
Replying to @RachelRecruitin
Just cleaned it and it peeled off! Hope yours went as well.
1
1
I didn’t see it, but it was reported on three years ago. nytimes.com/2017/11/01/world…
2
Interesting reading about breach notification obligations, how bug bounty factors into it, and Twitter’s performance (or lack thereof).
The EDPB's first binding decision on the basis of Art. 65 GDPR regarding the draft decision by the Irish SA @DPCIreland on Twitter International Company, as well as the final decision taken by the Irish SA are now available here: europa.eu/!Gn83qC
Replying to @RachelRecruitin
Last time, the burned crust layer just peeled off after soaking, and with a bit of scrubbing, the rest came off. But some steel wool might work too if yours sticks to the bottom.
1
1
All that said, if someone is using Zoom to schedule calls and wants tight integration, then sure, maybe this level of access makes sense. But for my very occasional one-off Zoom meeting, it's a huge overreach and Zoom should provide the custom URL method as an option.
1
I'm baffled why they would want to have that access? If they have a breach, it just got a million times worse if an attacker can erase millions of calendars of their customers.
1
Giving Zoom total access to every calendar I have access to is a gross overstep on their part in order for them to add a single event to my calendar. Even if they are not collecting my calendar data, using the pretense of adding a meeting to gain total access is suspicious.
1
For comparison, here's how other meeting providers do it, via a custom URL that requires no special access.
1
1
Every time I go to add a Zoom meeting to my calendar, I wonder why @zoom_us insists on having total access? All the other providers use the custom URL method to add calendar events, no access required. Over-collecting data when not required is likely a GDPR violation.
1
1
2
Replying to @RachelRecruitin
Ours is stainless steel and not the first time it's happen, so I already know it will clean up like new. If you have a non-stick pan, you'll want to toss it. The coating doesn't tolerate high heat and will leak chemicals into your food, even if it cleans up ok.
1
1
Replying to @RachelRecruitin
Twins, except here it was steaming frozen peas. Pot is now outside soaking...
1
Replying to @mmurray @JoeUchill
Use pre-boiled water, that has been the fastest in my experiments.
1
Elf on a Shelf is a surveillance training tool. Banned in my house.
We just watched Elf with my youngest for the first time. We laughed, but she didn’t get most of the jokes. Hopefully it goes better for you.
Replying to @mkonda
Classic ad placement.
Replying to @SarahWatson42
I did that with glue once. My project for work really sparkled.
US military also buys app location data. That’s why vendor contracts are increasingly demanding single country data access and storage, to prevent leaking of military/government personnel data.
Today's digital advertising based on selling user data to the highest bidder has been called the 'largest data breach ever', and yes: Two firms who sell targeted+mass surveillance to governments are hoovering phone location data from the ad/rtb bidstream: forbes.com/sites/thomasbrews…
Grades are detrimental to real learning and thinking. “Grades don’t prepare children for the ‘real world’ — unless one has in mind a world where interest in learning and quality of thinking are unimportant.” alfiekohn.org/article/case-g…