For those having to explain to confused family members/coworkers why Twitter/Facebook/etc haven’t “violated the First Amendment,” try this tactic.
Suppose their church runs a “prayer board” where people can leave prayer requests and messages of support (this is common). 1/
What if I posted a link to my OnlyFans. Would they be violating my First Amendment rights by removing it or disabling my account?
Don’t like the church example? What about posting ads for selling black market Fentanyl on an opiate addiction support forum. 2/
“But that’s illegal!” Oh, I hear you. So is inciting an insurrection, but let’s continue.
What about advertising abortion on a Christian message board?
Conversion therapy on an LGBTQ forum?
Good, so why is it okay to remove any of these messages? 3/
Obviously the answer is because the posts are inconsistent with the theme of the platform.
Good, now who sets the theme? That’s right, the site owner (uh oh, cognitive dissonance time!). So Twitter could consider the theme “not inciting insurrection violence?” as a theme? 4/
“But Twitter has no specific theme!” Could they not set themes by exclusion rather than inclusion?
“No, that’s stupid!” Why? We do it all the time. I don’t need to describe everyone I’d consider eating dinner with, but I can easily exclude terrorists and white nationalists. 5/
“Okay, but themes that block my opinion aren’t fair!” Okay, but hear me out: the people who want to promote their OnlyFans on the prayer site don’t see a problem with it either (perhaps as long as someone prays for them). Is it fair to block their opinion? 6/
Finally we cover the fact that a site can redefine its “theme” any time it wants to. I just ask if they’ve ever had a cable package that changed channels? That’s definitely a theme change. TV station programming change? That’s a theme change. 7/
Hopefully this helps.
Presenting these arguments to a family member today didn’t result in them changing their mind (at least not yet), but did leave them doing uncomfortable mental gymnastics and admitting I was asking questions they couldn’t answer. /FIN
• • •
Missing some Tweet in this thread? You can try to
force a refresh
As I continue to interact with folks dealing with the aftermath of the NYT JetBrains story, I'm calling it - the story was irresponsibly released.
The story lacks any actionable details and has collectively cost overworked security teams *thousands* of hours in response. 1/4
One defender I know called it "the NYT denial of service." I'm sorry if that hurts the author's feelings, but perspective and all...
"Officials are investigating" is hardly enough with something this big. The impact of speculation like this is HUGE for network defenders. 2/4
I get why executives are hammering security teams for assessments though.
Look at the wording used. We pivot from "officials are investigating" to "the company is unaware of any investigation/compromise" to "officials are not certain how THE compromise" (as if confirmed). 3/4
This story is getting a lot of attention. Let me quickly break down for followers not in offensive security what it means.
This is not great, but *the sky isn't falling*. Anyone who says this will immediately result in {thing} is uninformed (or worse) 1/ reuters.com/article/us-glo…
First, we need to take the MSFT information at face value. MSFT says attackers could *view* some code (not sure how much/what) but specifically notes that the attackers could not modify anything.
Claiming "well there's risk they had write access" is unproductive in every way. 2/
As MSFT notes in their blog post, they have embraced an open source threat modeling approach - assume the code will become open and don't tie security to secrecy.
Quick thread 🍸:
I’m a gen-X kid. I grew up in an age where I was told that nobody cared what you got a degree in, as long as you had a degree “they would know you can be trained.”
WTAF did that mean, anyway? Why did I need a college degree for that? 1/
But hey, I failed out of college. It was the best thing that ever happened to me. It took me out of medicine (I’d have been a practitioner, not a researcher) and put me on a track for something else. Of course it took a TBI along the way to get me here, but fate and all... 2/
Now I have degrees that are barely worth the paper they’re printed on. Lots of my friends do too. Most of them aren’t doing as well. The vast majority work in fields outside of their study.
But hey, you can still succeed. I come from food stamps, not generational wealth. 3/
Twas the night before Christmas and all over the ‘net,
Not a creature was stirring except a few cyber threats
The firewalls were configured at the egress with care,
But that wouldn’t stop us from being hit by ransomware. 1/
The children were nestled all snug in their beds,
While attackers hit the web server and established a beachhead
Mama with her EDR and I with my IDS
Were ready to tackle this hot infosec mess. /2
Down in the SOC there arose such a clatter,
I logged into my dashboard to see what was the matter.
This thing had better work, it cost so much cash.
How in 2020 can this thing STILL require Flash?! 3/
Now governments have sovereign immunity in most matters under international law. Mercenaries, not so much (IANAL, talk to yours).
But certainly suppliers of weapons to a government wouldn't be held liable if they are used against another nation, right? 2/
That's what NSO is arguing - they are just a provider of weapons. The problem is that NSO went far beyond "just providing the exploit." It appears that in most (if not all) cases they delivered the exploit and managed collection from targets as well. 3/
There’s an additional aspect to this particular government shutdown: these disruptions are favorable operating conditions for cyber adversaries. I hear we’re in the middle of investigating a fairly large breach...
A shutdown now will ABSOLUTELY harm our ability to remediate. 1/
Yes, I know “essential personnel” will still report to work. But as a former fed myself (who was always considered essential), I can tell you that things obviously don’t function as normal, even for your “mission essential” activities. 2/
And some of the damage is already done. Managers are already preparing for shutdowns, distracting them from focusing on where they need to be placing effort on breach investigation and response. The damage will be so much worse if the shutdown starts though. 3/