Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#Encrypted
Joe Karlsson
JoeKarlsson1
Protesting Tech Tips from a Software Engineer:- Disable fingerprint/face unlock on your phones (cops don't need a warrant for those, but they do for your password).- Wear a face mask
Read more
Paige Byerly
paigebyerly
The plots of 90% of Marvel movies are dependent on scientists not keeping a lab notebook or backing up their data & it’s such bad research practice Died & all
Read more
balajis.com
balajis
Domain name > real nameA domain name may be the most useful type of pseudonym.It pulls up your site as the first hit when punched into a browser; indeed, it
Read more
Soumyadipta
Soumyadipta
Last year (2019), I stumbled upon a sinister Chinese plot to create WhatsApp groups and circulate social media content to undermine India as a nation.Their aim was to recruit young,
Read more
Adrian
uberardy
What's this box? Turns out it's a voice generator from the cold war era used for Short Wave radio stations, known as Number Stations![image: mfs-sammler, https://commons.wikimedia.org/wiki/File:Sprach-Morse-Generator.jpg] They were
Read more
Koos Couvée
KoosCouvee
Europol's latest Serious and Organised Crime Threat Assessment, published yesterday, made for interesting reading – notably the admission that officials previously underestimated the scale and complexity of contemporary money-launderi
Read more
Ariel 🏳️⚧️Trans Boy Summer🏳️⚧️ He/Him BLM ☂️✡️
ArielScan4BLM
So a lot of people have been talking Seattle/Portland today (which I love and I love all of us learning from each other) and I want to bring up something
Read more
Theodore CHRISTAKIS
TC_IntLaw
Very important decision today by the top French Administrative Court @Conseil_Etat on post #SchremsII developmentsThe Court rejects the request of the petitioners against the hosting of the #healthdatahub by @MicrosoftEU
Read more
Steve Syfuhs
SteveSyfuhs
Okay folks, let's talk Kerberos. Strap in. It'll be a long one.https://twitter.com/SteveSyfuhs/status/1305928453674340352 At it's core Kerberos is an authenticated key agreement protocol based on the Needham-Schroeder protocol.
Read more
Trezor
Trezor
1/8 Efforts to oppress citizens and erode individuals' rights to privacy, as we see here, are a great validator of Trezor's open-source philosophy. Since the beginning, we have designed Trezor
Read more
Brian Platt
btaplatt
RCMP say the shooter had access to several guns, including a pistol and long-barrelled weapons. (This is before he reportedly stole the RCMP officer's handgun.) They have earlier said he
Read more
Steve Syfuhs
SteveSyfuhs
Have you ever wondered what happens behind the scenes when you type your password into the Windows logon screen and hit enter? I'm waiting for a build to complete, so
Read more
Jack Morse
jmorse_
Slowly digging through #BlueLeaks and keep finding gems like Homeland Security warning police of low-tech ways "smugglers" can defeat automated license plate readers (ALPRs) Law enforcement told that if they
Read more
sarah jeong
sarahjeong
Just a reminder that Signal calls and FaceTime Audio are both end to end encrypted.https://twitter.com/kenklippenstein/status/1308171766947352576 and this is maybe beside the point and a distraction from a real horror show,
Read more
Robin
robin__craig
i've been at multiple protests where police in full riot gear have charged at unarmed protesters i can guarantee you the uk police are not better or less racist if
Read more
Professor😎
VinnieBaite
If USA finds a cure for Covid19. Its going to be transported in the 1st 3 days of discovery. At exactly 22-0000hrs to a certain pharmacy.why? Because the whole world
Read more
‹
1
2
3
4
5
6
7
8
...
17
18
›