The total depravity of the Travis Scott concert; continuing to play as people were dying in the audience — should be recognized as an outcome of late stage capitalism
Production too big! Can’t shut it down. That’s too expensive.
8 people died and 17 were rushed to the hospital. 300 treated overall
Now he’s out here deleting tweets, because people will be looking to sue the businesses associated with this to receive reparations for their loved one.
Since I’ve been doing stuff in web3 over the past few months, I can answer questions from skeptical folks about all this NFT stuff, or whatever other questions you have.
First up, some common questions:
Q: Are NFTs a scam?
A: Some yes, some no, depending on your definition.
There is a time investment required to learn common indicators/to identify scam-like behavior.
Threat actors (criminals) exist in every financial ecosystem, NFTs no exception.
The space is unregulated, the technologies are new/currently in development, and few cybersecurity folks have made time investments into web3.
This will change, and so will the behavior of threat actors as they seek to adapt to environments which enable them to win.
First of all, what is ShotSpotter? Here's how they describe their technology & process.
Essentially, their technology wiretaps neighborhoods in an attempt to alert police in the event of a gunshot detection.
Ninety (90) U.S. cities were already using this technology as of 2017.
The primary article they're complaining about in the lawsuit against VICE dropped on July 26th and describes outright fabrication of evidence (fraud) in one specific case and suggests this may have occurred in other cases.
With iOS 15, Apple has ended my ability to link two of my wireless radios to create a hotspot without interference from my wireless service provider, eliminating my choice to work from a coffee shop this morning and to use the hardware I own in the manner I so choose
I can no longer turn on the Hotspot (CONTROL MY OWN HARDWARE RADIOS) without permission from Verizon
This probably has something to do with the fact that I changed off an unlimited plan a few weeks ago, but changed back to it recently. Maybe it isn't iOS 15- it was always a problem, and I'm only noticing because I switched off an unlimited, hotspot-inclusive wireless plan.
Creating art which is then roundly enjoyed by others has helped me with perfectionism.
Intellectually, I know that ‘perfect is the enemy of good’.
Unfortunately, my standards for my own work are often far too high to encourage incremental progress & learning in public.
2/8
Part of the reason why I feel that way is because the security community is so frequently negatively judging. As this is the community I joined from a young age, it has molded my behavior to be far too constrained & limited — in direct opposition to the hacker ethos.
People who cheat & steal harm the rest of us through their actions. These “bad apples” who act in their own self-interest above the common interest tend to rely on secrecy and obfuscation in order to commit their misdeeds.
One can have privacy without secrecy. This is the model being tested in cryptocurrency now.
If you’re interested in learning about some avant-garde technical work, check out the work done by various groups to advance the concept of Decentralized Autonomous Organizations (DAOs).
It would be really cool to establish HackerDAO. I’ve given it a lot of thought, but ultimately I don’t think that it is an ‘idea whose time has come’ for the majority of folks who follow me. These ideas take time to percolate, and DAOs are still a very niche idea at present.
Have you ever wanted to drop out of infosec and become your own defensive consultant? Learn from us and our mistakes.
Some things @0xBanana and I learned running our first startup, a boutique cybersecurity consultancy 2018-2020.
A thread🧵
1/
Having lots of enterprise contacts will only get you so far.
Lg corps who have interesting infosec problems to solve typically won't hire a small consultancy unless they have a decent assurance the risk of doing so is low, and the value which will be gained will be high.
2/
Small to mid-size corps have much, much less interesting infosec problems to solve.
In this category, orgs who happen to have a budget with which to hire infosec mostly need product-focused security engineering support, and some nascent devsecops capability.
3/