I’m back! Went offline for most of the last week, pics and stories to follow 🐊
Alrighty, where do I even begin on this? It’s going to be a series of photos and vids of epic scenery so if that’s not your thing, tune out now. Otherwise… it’s off to the airport:
And that was the last we saw of a mask for a long time. The Northern Territory has been largely COVID free and felt… normal. We ended up there on “Territory Day” with @TimmyTrumpet DJ’ing on the beach with the balmy 34C winter sunset, and life was good 😊
Plus, they had an F18 ✈️
And fireworks 💥
Darwin was really just intended to be a stopover until Kakadu, but it turned out to be unexpectedly cool. Just a really chilled place with plenty of nice beach atmosphere.
But also a heap of interesting history (it was bombed in WW2), beautiful parks and nice walks
It’s also got a great restaurant prescient on the water and I’d be really happy to spend more time there in the future
Time for a little plane and off into the middle of nowhere ✈️
Bamurru Plains on the edge of Kakadu National Park. The largest in Australia at 20,000km. It’s… rustic
*Kinda* rustic. The huts don’t have a lot of walls and instead use a mesh you can see out of but not into which means you get a front row seat to all the wandering buffalo and wallabies 🦬 🦘
Ok, so really not that rustic at all. An infinity pool looking out over the floodplains with just a small edge between you and the crocs (“don’t go out there very far”, they warned)
Air boats are one of my new favourite things; they’re loud, fast and they drift sideways over things that don’t look like they should be driven on…
…but most importantly, they get you to places that could never be reached otherwise. It’s unimaginably beautiful here.
And then there’s quad bikes. And again, it’s about reaching hard to access locations. Much of it involved navigating around the termite hills which are effectively 1m high blocks of concrete.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
So this is an interesting one for several reasons. Firstly, the defacement which was obviously designed to antagonise a conservative media company. Maybe someone with an axe to grind, but definitely evidence of breach.
Then there are the 3 different classes of data set published at the bottom of the defacement, let's go through each by file name:
editors.json: this includes the name, personal email, phone and sometimes address of the journo. Given the politically charged nature of some of the content, PII exposure of this nature is extra concerning. It's now easy to match a story to someone's physical address and phone.
Alright folks, this is starting to smell like bullshit. Not the alleged breach (which smells bad for reasons I'll explain in a moment), but the "AI" line from both Europcar and the PR agency that just emailed me pitching someone's hot take on it. Here's why:
Firstly on the legitimacy of the data, a bunch of things don't add up. The most obvious one is that the email addresses and usernames bear no resemblance to the corresponding people names. For example:
Next, each of those usernames is then the alias of the email address. What are the chances that *every single username* aligns with the email address? Low, very low.
We often receive comments to the effect of “we want to purchase a @haveibeenpwned subscription but our company doesn’t allow us to use a credit card”. What is the financial reason behind this?
This is a very small portion compared to those that *do* pay by card, but why is this?
To add to this, having spent 14 years at Pfizer I’d see policies like this all the time. But it’s also not like there was a blanket ban: try going on a business trip and asking the person at the noodle shop you’re having lunch at to raise an invoice on 60 day terms 🤣
This also isn’t about traceability; spend the money, raise an expense claim with receipt, job done. I could understand if the answer was “because an invoice and wire transfer stops people randomly being stuff and puts procurement in control”, but they could still pay with a card.
Let me add some more context to the Dymocks breach, starting with giving them a massive pat on the back for responding so quickly. It was less than 48 hours ago between me contacting someone there via LinkedIn and them having sent disclosure emails to customers. Massive kudos!
What's not as clear from the story is the extent to which the data was already circulating before I was able to get in touch with them. Multiple Telegram channels and a popular *clear web* (not dark web) forum were broadly circulating the data.
I also suspect we're about to see a repeat of the question so many people raised after Optus and Medibank: why do they still have my data? About a quarter of the rows are flagged "inactive" with dates as far back as 2005, yet still sit there with address, email, phone etc.
Had a weird thing happen with @AzureApiMgmt that caused the public @haveibeenpwned API to start getting laggy, especially around 1 week ago. It went from ~220ms response times 90 days ago to over 1 second up until yesterday. Scaled out an instance and now we're down to ~70ms.
This is despite very consistent performance of the underlying @AzureFunctions app. Something started gradually going south at the APIM level and I'm continuing to look at that with the team there.
What I'm a bit more interested in now is tackling this graph. This is "gateway errors", namely the reason APIM rejects requests. Exceeding the rate limit is number 1, but invalid subscription keys are massive too, plus there's an obvious hourly spikey pattern.