Advertisement · 728 × 90

Posts by Stephanie So

Post image

Neutrino Modem xkcd.com/3017

1 year ago 4312 372 34 14

🚀Personal Best. I can say what we do in 10 words.

Databases:
store and update records
DLTs:
record transactions in order on a ledger
We:
structure events in order around objects across independent sources
💚

1 month ago 0 0 0 0

I'm so sorry I missed this, @at1c.bsky.social.

This is a strong accountability framework.

💯 for producing verifiable receipts for agent activity.

My concern generally is banking too much on identity as a control plane. Authority and delegated authority, especially in multi-agent systems is key.

1 month ago 1 0 1 0
Post image

Most online risks are structural.

Who bears the consequences? We do.

Digital transactions need receipts, we need proof of what's going on.

Why haven't we had them before? Because the internet was built without worrying about accountability.

It's gone on long enough. Put people first.

2 months ago 0 0 0 0

There is a core tension between privacy and verifiability.

You can hide information.
Or you can prove legitimacy.

It’s hard to do both at the same time.

4 months ago 0 0 0 0

better or worse, which aligns incentives for the owner and the user.

Agents may be assigned revocable digital identity and scoped access rights. "Burning" a right means it won't be found when the ledger updates.

There's more, all combining zero-trust with a proof-enforced control plane.

4 months ago 1 0 0 0

I'd like to get in touch with the author.

Our architecture @geeqofficial.bsky.social goes a few steps further to mitigate some of the remaining security concerns, e.g.

Agents themselves may be tokenized as assets. The agent owner is identifiable by their public key. That situates liability, for

4 months ago 0 0 1 0

Enjoyed this. Hope these comments are helpful.

I'm increasingly concerned about clicking through to an unfamiliar site, so I'd be more cautious about recommending that.

Even better would be to authenticate sites, content, and sources on a verifiable shared ledger that has no executable code.

4 months ago 0 0 0 0
Post image

🖊️I’ve been working with 3 stunning individuals to rethink, realign, and refocus our efforts in healthcare.

Imagine an app where

- it's impossible to bypass individual consent
- communications and actions are provable
- proofs become reimbursable
- your data is shared securely.

You can make it.

4 months ago 1 0 0 0
Advertisement
Preview
Continuity of Care Requires a Continuity Rail For most of my career, I believed continuity of care was a workflow problem. A scheduling challenge.

It means everything to have a physician leading the way.

#HealthcareInnovation #ContinuousCare #RuralHealth

www.linkedin.com/pulse/contin...

4 months ago 0 0 0 0

Hi, a few questions:

1. How are compromised keys immediately detected and replays prevented?

2. Is there documentation about the kind of immutable log that's used?

(I understand blockchain and DLTs, I'm very curious.)

3. Does the guarantee basically come down to Microsoft's trusted signature?

4 months ago 0 0 0 0

More details, please?

4 months ago 0 0 0 0

but clever, because once the malware is accepted, the blockchain is doing what it's supposed to do - make it available.

So, here's the warning for smart contract blockchain users. This was a client-side problem. Don't let your applications execute smart contract data without checking.

Be careful.

5 months ago 0 0 0 0

Malware + blockchain -> this concerned me, so I looked into it.

To be clear, the hackers used smart-contract based blockchains (not Geeq). They hid fragments of malware code in the smart contracts, then used those blockchains as repositories and delivery vehicles across their networks.

Not good -

5 months ago 2 0 1 0
Preview
ClickFix may be the biggest security threat your family has never heard of Relatively new technique can bypass many endpoint protections.

I hadn't heard of this #CyberSecurity threat called #clickfix

A good read.

arstechnica.com/security/202...

5 months ago 2 1 0 0
Preview
Cyber Insurance Policy Limits Exposed: Only Resilience Restores Investor Trust Estimated reading time: 4 minutes Financial Leaders Warn: Cyber Incidents Now Threaten Investor Confidence In financial services, trust equals capital.

Cyber Insurance Policy Limits Exposed: Only Resilience Restores Investor Trust

Omega Systems’ 2025 report, The Survival Imperative: Cyber Resilience in Financial Services, reveals an industry under siege.

Read all about it: cyberinsurancenews.org/cyber-insura...

#cyberinsurance #cybersecurity

6 months ago 2 1 0 0
Advertisement

Have you heard the news about local public key infrastructure?

We're working to make security less dependent on humans trying to outsmart AI.

It would work (it's PKI without the trusted middles).

We could use help to get adoption, all hands are welcome!

5 months ago 0 0 0 0

Please ask me to explain:

2-factor authentication fails to protect consumers.

It asks you to give your credentials without knowing who is on the other side.

That's what happens in help desk scams.

We must have *mutual* authentication in order to be truly secure.

You deserve it. We all do.

6 months ago 3 0 0 0

I remember that use case! Smart choice, discerning customers.

So nice to meet you!

7 months ago 3 0 1 0

Hi!

Yes! NFC technology! Much better than QR codes. Was that your invention? That's excellent.

Supply chain is a natural for blockchains, I agree. We're applying that concept to the information supply chain. We have mints without smart contracts (more secure) and global state awareness. 🥂

7 months ago 1 0 0 0

I'm glad to boost your public service announcements.

There's always something, please keep them coming!

Happy Friday.

7 months ago 2 0 2 0
Preview
✈️ Your Luggage Tag Could Be a Security Risk: Here's What Travelers Need to Know That crumpled paper tag on your suitcase? It might be a golden ticket for scammers.

✈️ That crumpled luggage tag on your suitcase? It could be a scammer’s golden ticket. Learn how baggage tag fraud works and the simple steps to protect yourself when you fly.

👉 Read more: open.substack.com/pub/cyberlif...

#TravelSafety #Cybersecurity #AirTravel #FraudPrevention #Privacy

7 months ago 3 1 1 0

I retweeted this article, thank you!

I have a fix for this. Now I need to figure out how to sell it to an airline!

7 months ago 2 0 2 0

Very happy to answer!!

7 months ago 0 0 0 0
Advertisement

Awful.

Yet each phase sounds like the same problem. A spoof.

That's why I'd like our local public key infrastructure to be adopted.

Check the blockchain ledger for the public key of whoever is requesting contact with you. If it's not there, don't reply.

Lookup and challenge can be automated

7 months ago 0 0 0 0

Cool, yet another attack surface.

I'm working on a secure communications layer where the sender of the message must use a public key.

The recipient is able to identify the sender's signature and need only pay attention to those secret messages.

Do that first, then enjoy steganography.

7 months ago 0 0 0 0

Right!

I'm with Hank.

#cybersecurity

8 months ago 0 0 0 0

Glad to meet you, @1obit.bsky.social. Thank you for saying you're on the same wavelength. I hope others are too - it's hard to know when people stay quiet ... But I believe.

8 months ago 0 0 0 0

Should be required reading. Thanks for sharing it.

9 months ago 1 0 0 0