CISO at @sardineai. Treasurer of @OWASP Board of Directors. (he/him) qatta' mIghtaHghach.

Phoenix, AZ
Joined July 2009
Bil Corry retweeted
If you want to help victims of intimate partner abuse that are worried that their devices have been compromised, this USENIX paper by Sam Havron is an excellent resource: usenix.org/system/files/sec1…
10
428
18
683
Never had an email use my name seven times before. Guess the spammer read "How to Win Friends and Influence People."
Replying to @steve_piercy
Fun! I’m always a bit weary of those slingshots every since that freak accident on the Amazing Race. youtube.com/watch?v=-OZjHj…
1
My 16-year-old daughter could legally drink when we lived in Europe. Makes me wonder if Twitter accurately enforces the drinking age internationally, or uses a US-centric age. Either way, I agree with skipping the birthdate and just asking.
2
It is possible to have better outcomes. theconversation.com/why-didn…
Wait, Apple is sending URLs to Tencent?! reclaimthenet.org/apple-safa…
239
2,695
634
3,259
Bil Corry retweeted
Only one detail is missing : he was a pilot in the French air force. He got several French decorations. Couldn’t join the US air force because of racial segregation.
Eugene Bullard, who became known as the Black Swallow of Death, was the first African-American pilot to fly in combat. He now has a statue in his honor, unveiled in Warner Robins, Georgia, at the Museum of Aviation next to Robins Air Force Base. cnn.it/33sLhTw
28
1,070
24
2,694
Replying to @DropboxSupport
Happens in Chrome and FireFox, same error. You can easily confirm it, try renaming the first item in a directory, you will not be able to.
1
Bil Corry retweeted
This year at @defcon I was asked by @CNN @donie to hack him live. I was able to take over 10+ accounts right in front of him. Here’s how I did it, what updates to demand of your service providers, & how to keep yourself safe. Teaser below, full vid here: facebook.com/cnn/videos/2417…
22
324
53
1,044
0
This is one reason why backdoors in cryptography are problematic. The government will abuse them.
A disturbing series of previously secret court rulings confirm what we’ve long known: the government can’t conduct mass surveillance and comply with the Fourth Amendment. It’s time to end Section 702. eff.org/deeplinks/2019/10/se…
1
1
Would you prefer a link about IBM aiding death squads in the Philippines instead? theintercept.com/2019/03/20/…
How my iPhone landed me with a £476 fine and made me a criminal | Financial Times ft.com/content/e8a177d4-dfae…
4
11
1
10
Bil Corry retweeted
Super interesting read on how to pivot from an email address to a phone number using #OSINT techniques. Solid research! Sad I missed the talk at Recon Village!
New blog post! From email address to phone number, a new #OSINT approach. You can find all details and materials from my @BSidesLV & @ReconVillage talk. Thanks for all the feedback. Stoked to hear how useful it is to find missing people, solve cases, etc. martinvigo.com/email2phonenu…
1
3
12
@LettersOfNote Declassified CIA memo threatening to cut off the supply of Coca Cola to CIA headquarters. cia.gov/library/readingroom/…
Replying to @coleencoolidge
It's a lot of fun. One of these years I want to go back and spin a yarn of my own.
1
@DropboxSupport There's a bug where I can't rename the first file in any directory using the web interface. Console shows a null error, which I've provided the screenshot of and another screen shot of where the error is in the code.
1
Replying to @aprilaser @iMeluny
IBM has a troubled history that hasn't really improved. theintercept.com/2019/07/12/…
1
1
13
Nobody show my son this video!
1
Replying to @coleencoolidge
Never heard of it, but sounds amazing! Another interesting little-known contest takes place in Southern California, the Pegleg Smith Liars contest. Awesome storytelling! borregosun.com/story/2019/02…
1
1
UK apparently lost faith in cybersecurity certification Common Criteria scheme (ncsc.gov.uk/information/comm…). This is big deal. Why? Cybersecurity certification is supposed to be a cornerstone of the European Cybersecurity Act (eur-lex.europa.eu/legal-cont…). Now what?
1
6
6