The Chinese Computer Emergency Response Center announced that a U.S. intelligence agency hacked an advanced materials unit and an energy-focused company, stealing important trade secrets and intellectual property via trojans. www.globaltimes.cn/page/202412/...
Posts by Yves K. D.
Daily. Very good for reading!
25m
Anyone else thinking that the emergence of the MCP server layer on top of Claude signals that LLMs are coming to data engineering for real? Who's interacting with a MCP server & agent framework already? Any hot takes? github.com/punkpeye/awe...
Check out the Hacking 2024 bundle. You get 18 infosec books (including my book, HACKS: LEAKS, AND REVELATIONS), you pay what you want, and it raises money for charity. It ends in 2 weeks www.humblebundle.com/books/hackin...
Exclusive: The backdoor inserted in v1.95.7 adds an "addToQueue" function which exfiltrates the private key through seemingly-legitimate CloudFlare headers.
Calls to this function are then inserted in various places that (legitimately) access the private key.
The AI chip race heats up as AWS unveils Trainium2 (T2) chips, designed to train and deploy large language models faster than Nvidia GPUs though Blackwell is expected to surpass them.
In a surprising move Apple announced it’s using AWS chips for search and exploring their use for Apple Intelligence
I think iOS 18.2 RC will likely be released next week 🤔
Suspicious behavior on T-Mobile US’s network devices tipped off the company to a breach that was potentially part of a sprawling cyber-espionage campaign that has raised urgent questions about the exposure of a critical sector of the economy
I agree it should be transparent. But it’s important that it should be easy to trust big account. It’s one of the tools against misinformation. Impersonating a non famous person vs a famous one is really different!
Exactly trust is everything. This is the reason why the process of verification should be strict and the verifier should be trustable as well!
Verification is all about what’s authority is behind it and what’s the process to be verified.
The blue check will be meaningless only if the process is not strict.
The last sentence is true, except the normal user of this platform may not understand it.
For example, no one can really say this domain really verifies you. Anyone can register a domain.
Domain verification is not bullet proof and will mostly work with well established organizations with known domains. I am not sure it will work for the lambda person. For example, how do you know a certain domain is really associated to a given person?
Great video
ZT & VPN aren’t mutually exclusive
Zero Trust isn’t just a buzzword—it’s a necessity. Zero Trust Network Access (ZTNA) can replace VPNs, reduce lateral movement, and harden existing devices, making them nearly impossible to exploit.
thehackernews.com/expert-insig...
By 2026 EU member state is obliged to offer an EU digital identity wallet (EUDIW) tink.com/blog/open-ba...
EUDIW is set to be built on the foundation of eUICC-supported-SAM.
#SecureApplicationForMobile
The eUICC-Supported-SAM initiative aims to transform our smartphones into our very own identities, complementing our physical Smartcards. This innovative approach promises to create a safer and more secure internet experience for all users.
youtu.be/gyiMbag0d1Y?...
After Microsoft, now Cloudflare discloses an incident where it lost customer logs... for Microsoft this was weeks of logs... for Cloudflare only 3.5 hours
blog.cloudflare.com/cloudflare-i...
iOS 19 is rumored to introduce a ChatGPT-like Siri, designed to handle more complex requests. Other features, apart from the new Siri, are reportedly delayed until iOS 19.4, set to launch in Spring 2026.
According to Mark Gurman
In such a pity that there is no freemium options. I use Wanderlog to keep planning my trips and pay the subscriptions when I am travelling!
Microsoft has deployed a fix to restore email and calendar services to thousands of users who reported outages early Monday, reaching about 98% of customers—but when exactly the programs will completely come back online is still unclear.
Here are my top 3 favorite iPhone gestures! The two-finger select is always a great party trick:
📺 Siri can control way more than just your garage! Inspired after hearing @joannastern.bsky.social and @gruber.foo discuss smart home, here's how I control over 100 HomeKit devices with Siri, including water hoses, ceiling fans, shades, lights, and yes, even the garage: youtu.be/wyFCipx4-14
cool to see other people had the same idea. i hope we see lots of competing takes on this
I don’t see the benefit of this
Benedict Evans writes an annual presentation on the big technology trends for the next year which is always insightful. The theme for 2025 is “AI eats the world”.
Really interesting paper about the future of smartcard and mobile based secure identify
#SAM #eUICC #eSIM #Smartcard #identity #Security
trustedconnectivityalliance.org/wp-content/u...
i’m starting to think labellers might be more powerful than blocklists. When you hit the “report” button, it gives you a workflow to report to any labeller. in fact, bluesky’s moderation service *is* a labeller
here’s a labeller for US politics
bsky.app/profile/uspo...