Advertisement · 728 × 90

Posts by Brian Epstein

Comic. One... two... THREE! [text in red] X Deprecated [line break] One... two... three... GO! [text in red] Deprecated [red curly bracket around top two lines] Too easy to mix up [line break] Three... two... one... GO! [text in green] [check mark] ISO Standard [caption] If I were in charge of ISO, the first thing I’d do would be to standardize the way people count out loud before doing something in sync.

Comic. One... two... THREE! [text in red] X Deprecated [line break] One... two... three... GO! [text in red] Deprecated [red curly bracket around top two lines] Too easy to mix up [line break] Three... two... one... GO! [text in green] [check mark] ISO Standard [caption] If I were in charge of ISO, the first thing I’d do would be to standardize the way people count out loud before doing something in sync.

Countdown Standard

xkcd.com/3232/

1 week ago 5408 869 102 61
Preview
Google tests Merkle Tree Certificates for quantum web Google is trialling Merkle Tree Certificates in Chrome to cut post-quantum HTTPS overhead while keeping web certificate issuance transparent.

I'm learning new things everyday about Post-Quantum Cryptography. X25519MLKEM768 is a Quantum-Secure key exchange, but the server authentication is still handled by RSA or ECC, which is not Quantum-Secure. Merkle Tree Certificates (MTCs), might work, but are big!
securitybrief.com.au/story/google...

1 month ago 0 0 0 0
Video

Postpartum depression, or depression after childbirth, is common.
Worldwide, more than 10% of pregnant women and women who have just given birth experience depression.

Seeking help is good for you and your baby https://bit.ly/45mDM2Q

1 month ago 114 33 0 4
Preview
ML-KEM Mythbusting What is this? There have been some recent concerns about ML-KEM, NIST’s standard for encryption with Post-Quantum Cryptography, related standards of the IETF, and lots of conspiracy theories …

The longer, better explained version by @sophieschmieg.infosec.exchange.ap.brid.gy.

4 months ago 30 2 0 1
Preview
Princeton University informs students of data breach A Princeton University employee fell for a phishing incident that gave access to a database related to fundraising activities.

Stay safe out there folks, phishing and scams come in all forms, including phone calls. This can happen to anyone.
"The school also revealed that the breach occurred following a phone phishing incident that targeted a school employee..."
www.newsweek.com/princeton-un...

5 months ago 0 0 0 0
Android Security Bulletin—November 2025  |  Android Open Source Project

Remote Code Execution vulnerability on Android 13-16. Latest November updates should patch.

source.android.com/docs/securit...

5 months ago 0 0 0 0
BSA Learn Center

I challenge all my Scouting America family to take the brand new Diversity, Equity, Inclusion, and Belonging training (SCO 1800). It only takes 30min, and is crucial to us bringing the best program we can. Let me know you completed it by commenting below!
training.scouting.org/courses/SCO_...

5 months ago 2 0 0 0
Preview
Signal Protocol and Post-Quantum Ratchets We are excited to announce a significant advancement in the security of the Signal Protocol: the introduction of the Sparse Post Quantum Ratchet (SPQR). This new ratchet enhances the Signal Protocol’s...

More post quantum protections are going to be implemented by Signal. signal.org/blog/spqr/

6 months ago 3 0 0 0
Graphic with the message I don’t let “free speech” excuse harm in workplaces. Because some people invoke “free speech” to defend harmful behavior. It was just a joke. I have the right to free speech. There’s also a drawing of a person holding a bubble indicating they’re saying something. The bubble has a triangular warning sign in it. Along the bottom is the @BetterAllies handle and credit to @ninalimpi for the drawing.

Graphic with the message I don’t let “free speech” excuse harm in workplaces. Because some people invoke “free speech” to defend harmful behavior. It was just a joke. I have the right to free speech. There’s also a drawing of a person holding a bubble indicating they’re saying something. The bubble has a triangular warning sign in it. Along the bottom is the @BetterAllies handle and credit to @ninalimpi for the drawing.

Picture this: An employee calls out a manager’s “joke” about accents as offensive. The manager shrugs it off. “It was just a joke. I have the right to free speech.”

Let’s notice when someone misuses free speech as a shield for harmful behavior. And speak up.

#Inclusion #BetterWorkplaces

7 months ago 4 2 0 1
Preview
International Allyship Day This holiday encourages all to use their privilege to those facing inequality in underrepresented groups and minority communities.

Happy International Allyship Day! nationaltoday.com/internationa... . Today I celebrate by reading my daily Ally Actions and try to integrate them into my life. betterallies.com/more-content/

8 months ago 0 0 0 0
Advertisement
Preview
Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dog : Computer scientist Peter Gutmann tells The Reg why it's 'bollocks'

www.theregister.com/AMP/2025/07/...

9 months ago 1 0 0 0
But what is quantum computing?  (Grover's Algorithm)
But what is quantum computing? (Grover's Algorithm) YouTube video by 3Blue1Brown

I found this video by @3blue1brown.com to be an excellent, if not the best, explanation of Quantum Computing. I highly recommend it and the resources he lists as well. www.youtube.com/watch?v=RQWp...

11 months ago 0 0 0 0
Preview
New SSL/TLS certs to each live no longer than 47 days by 2029 : IT admins, get ready to grumble

New SSL/TLS certs to each live no longer than 47 days by 2029

The depreciation schedule is now as follows:

March 15, 2026: renewed every 200 days.

March 15, 2027: down to 100 days.

March 15, 2029: limited to 47 days, and 10 days for DCVs.

www.theregister.com/AMP/2025/04/...

1 year ago 0 0 0 0
Internet Crime Complaint Center (IC3) | Violent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe

FBI report: Violent Online Networks Target Vulnerable and Underage Populations Across the United States and Around the Globe

Stay safe out there and learn to recognize the markers of abuse for our vulnerable anger underage population.

www.ic3.gov/PSA/2025/PSA...

1 year ago 0 0 0 0
Blue background with illustration of two people using technology. TEXT: HECVAT Safeguarding Higher Education with Streamlined Vendor Assessment All New Version 4 - New and updated questions related to privacy and AI - Increased flexibility for institutional evaluation - Better training materials for corporations and higher education institutions

Community driven in collaboration with EDUCAUSE, Internet2, and REN-ISAC.

Blue background with illustration of two people using technology. TEXT: HECVAT Safeguarding Higher Education with Streamlined Vendor Assessment All New Version 4 - New and updated questions related to privacy and AI - Increased flexibility for institutional evaluation - Better training materials for corporations and higher education institutions Community driven in collaboration with EDUCAUSE, Internet2, and REN-ISAC.

The Higher Education Community Vendor Assessment Toolkit (HECVAT) team has launched HECVAT 4. The new version is better than ever with new and updated artificial intelligence and privacy questions, training materials for institutions and solution providers, and more. https://buff.ly/3QdUsBr

1 year ago 4 2 1 0
Preview
Phishing texts trick Apple iMessage users into disabling protection Cybercriminals are exploiting a trick to turn off Apple iMessage's built-in phishing protection for a text and trick users into re-enabling disabled phishing links.

Phishing texts trick Apple iMessage users into disabling protection www.bleepingcomputer.com/news/securit...

1 year ago 0 0 0 0
Preview
'Frankenstein Fraud' Is Quickly Becoming the Most Dangerous Form of Identity Theft Criminals combine a real person's Social Security number with other real or made-up details to trick credit issuers.

This type of identity theft specifically targets kids. Definitely something to be aware of.
'Frankenstein Fraud' Is Quickly Becoming the Most Dangerous Form of Identity Theft
www.cnet.com/personal-fin...

1 year ago 0 0 0 0

SunOS 5/Solaris. Then I was playing with this new fangled Slackware Linux thing for fun...

1 year ago 2 0 1 0
Advertisement
Preview
How to tell if a USB cable is hiding malicious hacker hardware Here's how to tell if your USB cables contain hidden malicious hardware and are sending your data to hackers.

How to tell if a USB cable is hiding malicious hacker hardware... TL;DR, you can't, get a good data blocker. :)
www.pcworld.com/article/2557...

1 year ago 0 0 0 0
Preview
With a January ban looming, TikTok's future in the U.S. is more uncertain than ever A new law gives TikTok a Jan. 19 deadline to sell to a non-Chinese company or face a nationwide ban. Law professor Alan Rozenshtein explains what this means and how President-elect Trump might interve...

NPR Reports, "With a January ban looming, TikTok's future in the U.S. is more uncertain than ever"
www.npr.org/2024/12/18/g...

1 year ago 0 0 0 0
Preview
Find Out Why Health Insurance Denied Your Claim You likely have the right to access records that explain why your insurer denied your claim or prior authorization request. Use ProPublica’s free tool to generate a letter requesting your claim file f...

I don't know who needs to know this, but Pro Publica has an online thing that will format a letter to your US health insurance company to demand the records behind a claim denial. (which the insurance is then legally required to provide in most cases)

projects.propublica.org/claimfile/

2 years ago 17994 10213 919 503
Internet Crime Complaint Center (IC3) | Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud

FBI: Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud. It was only a matter of time.
www.ic3.gov/PSA/2024/PSA...

1 year ago 0 0 0 0
myE-Verify Protect your identity, track your E-Verify case, learn your rights and confirm your own employment eligibility. It’s easy and free!

myE-Verify can lock your Social Security Number to help protect yourself from identity theft. It is similar to freezing your credit, but for your SSN. myeverify.uscis.gov

1 year ago 1 0 0 0