Neutrino Modem xkcd.com/3017
Posts by Stephanie So
🚀Personal Best. I can say what we do in 10 words.
Databases:
store and update records
DLTs:
record transactions in order on a ledger
We:
structure events in order around objects across independent sources
💚
I'm so sorry I missed this, @at1c.bsky.social.
This is a strong accountability framework.
💯 for producing verifiable receipts for agent activity.
My concern generally is banking too much on identity as a control plane. Authority and delegated authority, especially in multi-agent systems is key.
Most online risks are structural.
Who bears the consequences? We do.
Digital transactions need receipts, we need proof of what's going on.
Why haven't we had them before? Because the internet was built without worrying about accountability.
It's gone on long enough. Put people first.
There is a core tension between privacy and verifiability.
You can hide information.
Or you can prove legitimacy.
It’s hard to do both at the same time.
better or worse, which aligns incentives for the owner and the user.
Agents may be assigned revocable digital identity and scoped access rights. "Burning" a right means it won't be found when the ledger updates.
There's more, all combining zero-trust with a proof-enforced control plane.
I'd like to get in touch with the author.
Our architecture @geeqofficial.bsky.social goes a few steps further to mitigate some of the remaining security concerns, e.g.
Agents themselves may be tokenized as assets. The agent owner is identifiable by their public key. That situates liability, for
Enjoyed this. Hope these comments are helpful.
I'm increasingly concerned about clicking through to an unfamiliar site, so I'd be more cautious about recommending that.
Even better would be to authenticate sites, content, and sources on a verifiable shared ledger that has no executable code.
🖊️I’ve been working with 3 stunning individuals to rethink, realign, and refocus our efforts in healthcare.
Imagine an app where
- it's impossible to bypass individual consent
- communications and actions are provable
- proofs become reimbursable
- your data is shared securely.
You can make it.
It means everything to have a physician leading the way.
#HealthcareInnovation #ContinuousCare #RuralHealth
www.linkedin.com/pulse/contin...
Hi, a few questions:
1. How are compromised keys immediately detected and replays prevented?
2. Is there documentation about the kind of immutable log that's used?
(I understand blockchain and DLTs, I'm very curious.)
3. Does the guarantee basically come down to Microsoft's trusted signature?
More details, please?
but clever, because once the malware is accepted, the blockchain is doing what it's supposed to do - make it available.
So, here's the warning for smart contract blockchain users. This was a client-side problem. Don't let your applications execute smart contract data without checking.
Be careful.
Malware + blockchain -> this concerned me, so I looked into it.
To be clear, the hackers used smart-contract based blockchains (not Geeq). They hid fragments of malware code in the smart contracts, then used those blockchains as repositories and delivery vehicles across their networks.
Not good -
I hadn't heard of this #CyberSecurity threat called #clickfix
A good read.
arstechnica.com/security/202...
Cyber Insurance Policy Limits Exposed: Only Resilience Restores Investor Trust
Omega Systems’ 2025 report, The Survival Imperative: Cyber Resilience in Financial Services, reveals an industry under siege.
Read all about it: cyberinsurancenews.org/cyber-insura...
#cyberinsurance #cybersecurity
Have you heard the news about local public key infrastructure?
We're working to make security less dependent on humans trying to outsmart AI.
It would work (it's PKI without the trusted middles).
We could use help to get adoption, all hands are welcome!
Please ask me to explain:
2-factor authentication fails to protect consumers.
It asks you to give your credentials without knowing who is on the other side.
That's what happens in help desk scams.
We must have *mutual* authentication in order to be truly secure.
You deserve it. We all do.
I remember that use case! Smart choice, discerning customers.
So nice to meet you!
Hi!
Yes! NFC technology! Much better than QR codes. Was that your invention? That's excellent.
Supply chain is a natural for blockchains, I agree. We're applying that concept to the information supply chain. We have mints without smart contracts (more secure) and global state awareness. 🥂
I'm glad to boost your public service announcements.
There's always something, please keep them coming!
Happy Friday.
✈️ That crumpled luggage tag on your suitcase? It could be a scammer’s golden ticket. Learn how baggage tag fraud works and the simple steps to protect yourself when you fly.
👉 Read more: open.substack.com/pub/cyberlif...
#TravelSafety #Cybersecurity #AirTravel #FraudPrevention #Privacy
I retweeted this article, thank you!
I have a fix for this. Now I need to figure out how to sell it to an airline!
Very happy to answer!!
Awful.
Yet each phase sounds like the same problem. A spoof.
That's why I'd like our local public key infrastructure to be adopted.
Check the blockchain ledger for the public key of whoever is requesting contact with you. If it's not there, don't reply.
Lookup and challenge can be automated
Cool, yet another attack surface.
I'm working on a secure communications layer where the sender of the message must use a public key.
The recipient is able to identify the sender's signature and need only pay attention to those secret messages.
Do that first, then enjoy steganography.
Right!
I'm with Hank.
#cybersecurity
Glad to meet you, @1obit.bsky.social. Thank you for saying you're on the same wavelength. I hope others are too - it's hard to know when people stay quiet ... But I believe.
Should be required reading. Thanks for sharing it.