Dino A. Dai Zovi
@ddz.bsky.social
📤 1924
📥 108
📝 132
I drink amari and I know things. $ddz LMDDGTFY:
https://duckduckgo.com/?q=dino+dai+zovi
NYC/BK
reposted by
Dino A. Dai Zovi
Kendra Albert
8 months ago
New users, on Signal, you can mute chats for a period or permanently. No notifications but you can still see if there are unread messages. On desktop: in that chat, go to Group Settings, then Notifications. On iPhone: in that chat, click on the name at the top, then go to Sounds & Notifications.
4
65
14
"Life Safety building automation is pretty awesome. 👏"
add a skeleton here at some point
8 months ago
0
3
0
reposted by
Dino A. Dai Zovi
Angie Jones
8 months ago
Excellent writeup on how MCP future-proofs API integrations ~
@stevemanuel.bsky.social
docs.mcp.run/blog/2025/03...
loading . . .
MCP: The Differential for Modern APIs and Systems | 🤖
<div style={{
https://docs.mcp.run/blog/2025/03/27/mcp-differential-for-modern-apis/
1
21
9
reposted by
Dino A. Dai Zovi
OffensiveCon
9 months ago
Our second keynote for Offensivecon 2025 will be Dino Dai Zovi!
@ddz.bsky.social
0
9
4
I'll be doing a speaking!
add a skeleton here at some point
8 months ago
0
9
2
reposted by
Dino A. Dai Zovi
4Dgifts
9 months ago
Saw this on the other site but I should comment here: Can't remember his hacker handle but I think Pad & Gandalf of 8lgm were arrested the same day in 1991. You may not know it but the entire infosec & software industries owe 8lgm immense gratitude for making vendors accountable for their vulns
0
9
6
reposted by
Dino A. Dai Zovi
antirez
10 months ago
We are destroying software:
antirez.com/news/145
loading . . .
We are destroying software - <antirez>
https://antirez.com/news/145
17
213
78
Exactly this. We should instead be investing that energy into making authentication in our environment unphishable by making it impossible to give away access to an attacker, even if someone actually wanted to.
add a skeleton here at some point
10 months ago
0
5
1
reposted by
Dino A. Dai Zovi
Shell
10 months ago
I have never once run a phishing sim. I refuse to use the word. I put it in air quotes and say scam by text or email etc Tech and cyber has been about deflecting blame to anyone else but themselves- which is what sims are. Blaming people when the system they use should protect against issues.
2
10
4
reposted by
Dino A. Dai Zovi
Lorenzo Franceschi-Bicchierai
10 months ago
NEW: WhatsApp says it has notified 90 victims, including journalists and members of civil society, that they were targeted with spyware made by Paragon. This is the first time that Paragon is linked to alleged abuse of its products.
techcrunch.com/2025/01/31/w...
loading . . .
WhatsApp says it disrupted a hacking campaign targeting journalists with spyware | TechCrunch
The Meta-owned company said the campaign was linked to Israeli spyware maker Paragon.
https://techcrunch.com/2025/01/31/whatsapp-says-it-disrupted-a-hacking-campaign-targeting-journalists-with-spyware/
1
60
37
reposted by
Dino A. Dai Zovi
evacide
10 months ago
Meta says almost 100 journalists and activists were targeted with spyware from Israeli company Paragon Solutions using a zero-click vuln in WhatsApp. If you use an iPhone, enabling Lockdown Mode prevents this from working.
www.theguardian.com/technology/2...
loading . . .
WhatsApp says journalists and civil society members were targets of Israeli spyware
Messaging app said it had ‘high confidence’ some users were targeted and ‘possibly compromised’ by Paragon Solutions spyware
https://www.theguardian.com/technology/2025/jan/31/whatsapp-israel-spyware
7
187
140
reposted by
Dino A. Dai Zovi
Dennis
11 months ago
If you're interested in the history of bug bounties, for reasons, this series I did a few years ago with
@k8em0.bsky.social
@caseyjohnellis.bsky.social
@ddz.bsky.social
and many others may be of interest.
duo.com/decipher/law...
loading . . .
Lawyers, Bugs, and Money: When Bug Bounties Went Boom
Bug bounties have grown from a niche idea to encourage independent security research into a massive business and a legitimate career path for bug hunters in less than 15 years. This is the story of th...
https://duo.com/decipher/lawyers-bugs-and-money-when-bug-bounties-went-boom
5
32
14
I'm really liking the crisp definitions of and boundaries between product engineering, domain engineering, and infra engineering in this. How much of your security org builds "what any company would need" (infra) vs. "what is unique to this company but shared across the company" (domain) ?
add a skeleton here at some point
11 months ago
0
11
1
There are different privacy concerns and approaches for the training phase of AI as well as for the inference phase of using it. It's a good time to be thinking about what the right approaches are for each.
add a skeleton here at some point
11 months ago
0
3
0
reposted by
Dino A. Dai Zovi
Matthew Green
11 months ago
I wrote a post about how AI will interface with end-to-end encryption. TL;DR maybe not so well!
blog.cryptographyengineering.com/2025/01/17/l...
loading . . .
Let’s talk about AI and end-to-end encryption
Recently, I came across a fantastic new paper by a group of NYU and Cornell researchers entitled “How to think about end-to-end encryption and AI.” I’m extremely grateful to see t…
https://blog.cryptographyengineering.com/2025/01/17/lets-talk-about-ai-and-end-to-end-encryption/
12
206
98
+1, security product vendors, services companies, *and* internal teams must always operate under the Hippocratic Oath, "First, do no harm."
add a skeleton here at some point
11 months ago
1
3
2
reposted by
Dino A. Dai Zovi
Kevin Collier
11 months ago
So phone metadata *is* actually sensitive and important information? So hard to keep this straight.
loading . . .
FBI Has Warned Agents It Believes Hackers Stole Their Call Logs
FBI leaders have warned that they believe hackers who broke into AT&T Inc.’s system last year stole months of their agents’ call and text logs, setting off a race within the bureau to protect the ...
https://www.bloomberg.com/news/articles/2025-01-16/fbi-has-warned-agents-it-believes-hackers-stole-their-call-logs
7
437
97
We blogged again! This time about our Data Safety Levels framework, which was inspired by the CDC/WHO Biosafety Levels system and Laboratory Biosafety Manuals. Like biological agents, we also don't want sensitive data to be exposed to humans or escape.
code.cash.app/dsl-framework
loading . . .
Data Safety Levels Framework: The foundation of how we look at data in Block
Block uses the Data Safety Levels (DSL) Framework to evaluate data sensitivity.
https://code.cash.app/dsl-framework
11 months ago
0
5
3
The placement of liability for fraudulent credit card charges onto the issuer incentivized the shift to EMV, so we now have smartcards in our wallets and secure elements on our smartphones. Contrast this to the security of authn to way more critical things than buying a coffee.
11 months ago
3
9
2
reposted by
Dino A. Dai Zovi
Filippo Valsorda
11 months ago
Ever wanted to benchmark RSA key generation but found it too slow and variable, like benchmarking a lottery? No? Just me? Well, I nerd-sniped myself into producing average representative inputs that can be used to benchmark, profile, and compare RSA keygen.
c2sp.org/CCTV/keygen
Happy New Year(?)!
loading . . .
Benchmarking RSA Key Generation
RSA key generation is conceptually simple, but extremely tricky. Even benchmarking involves math: we generated a stable but representative “average case” instead of using the ordinary statistical appr...
https://words.filippo.io/dispatches/rsa-keygen-bench/
2
66
13
reposted by
Dino A. Dai Zovi
Matthew Green
12 months ago
This Salt Typhoon stuff is insane. The entire FISA surveillance infrastructure has been completely owned by China and literally no part of our telecom infrastructure is safe to use without end-to-end encryption.
27
903
356
reposted by
Dino A. Dai Zovi
Sphexish Quine
12 months ago
You’re still arguing about tabs vs. spaces? May I present…
157
5325
1439
The subtle benefit of *minimal* version selection as a systemic damper on software supply chain attacks: "What’s more, the deeper in your dependency tree the library is, the more explicit approvals are required for the library to propagate to your project."
matklad.github.io/2024/12/24/m...
loading . . .
Minimal Version Selection Revisited
In this post, I want to highlight one aspect of Go-style minimal version selection that I have missed completely at first. Maybe you missed it too?
https://matklad.github.io/2024/12/24/minimal-version-selection-revisited.html
12 months ago
0
7
1
The transition from static long-term "credentials" (PAN + CVV) to EMV cryptograms generated by smartcards and the continuing transition for online payments are good case studies for how to devalue data to the point of making attacks on processing infra no longer worthwhile. Human authn must be next.
add a skeleton here at some point
12 months ago
0
4
1
reposted by
Dino A. Dai Zovi
Mike Masnick
12 months ago
Honestly, the Let's Encrypt folks don't get nearly enough credit for basically protecting the entire fucking internet, by making it absolute bog standard to encrypt everything. It happened so fast and so many people were skeptical.
add a skeleton here at some point
16
1263
294
reposted by
Dino A. Dai Zovi
Stéphane Taillat
12 months ago
An excellent episode on a topic on which I've given some thoughts in my book with similar conclusions: 1️⃣Targeting TikTok in the name of "national security" avoids addressing the structural problems of unregulated personal data and content moderation.
add a skeleton here at some point
1
15
5
reposted by
Dino A. Dai Zovi
Bob Lord
12 months ago
Directory traversal vulnerabilities have plagued software customers for over two decades. It's time for software companies to step up and eliminate this persistent class of coding error entirely. More info here:
https://buff.ly/3QpbblJ
1
5
2
A bias can form if folks' primary exposure to Signal (or really any other tool) is through observing malicious uses. I've seen it happen with cryptocurrencies as well. A useful tool will often find itself useful for both beneficial and malicious use-cases. It's as old as discovering fire.
add a skeleton here at some point
12 months ago
0
8
0
reposted by
Dino A. Dai Zovi
Meredith Whittaker
12 months ago
This is disingenuous marketing. Signal chats can't be 'monitored' by anyone not in those chats. Dressing up "joining groups via publicly posted links, then exfiltrating group data" as an offensive 'cybercapability' borders on misinfo, and confuses/scares ppl who rely on Signal for robust privacy.
add a skeleton here at some point
17
541
161
reposted by
Dino A. Dai Zovi
Bob Lord
12 months ago
The best Christmas movies are Three Days of the Condor and The Conversation. 🎥 🍿 Thank you for attending my TED talk.
6
17
2
reposted by
Dino A. Dai Zovi
Renee DiResta
12 months ago
🧵New paper out on MIDDLEWARE‼️What is it? 3rd party tools that can interact with, in this case, social media platforms, on behalf of users. Maybe to curate your feed in a particular way. Maybe to moderate, labeling & hiding content or users that you don't want to see.
www.thefai.org/posts/shapin...
loading . . .
Shaping the Future of Social Media with Middleware | The Foundation for American Innovation
This paper is co-published by the Foundation for American Innovation and Georgetown University’s McCourt School of Public Policy.
https://www.thefai.org/posts/shaping-the-future-of-social-media-with-middleware
15
224
54
reposted by
Dino A. Dai Zovi
Hexadecim8
12 months ago
Friends, FBI has responded to my FOIA request for Kevin Mitnick's files, and have made them available to everyone via the FBI public portal here:
vault.fbi.gov/kevin-mitnic...
loading . . .
Kevin Mitnick Part 01 (Final)
https://vault.fbi.gov/kevin-mitnick/kevin-mitnick-part-01-final/view
8
212
83
reposted by
Dino A. Dai Zovi
Joseph Cox
12 months ago
New: Cellebrite is being used as doorway to install malware. Amnesty finds multiple cases where police used Cellebrite to unlock phone; cops then used that access to infect with spyware which takes screenshots, turns on mic, etc, give phone back to target. In Serbia
www.404media.co/cellebrite-u...
4
175
109
reposted by
Dino A. Dai Zovi
John Scott-Railton
12 months ago
NEW: police in
#Serbia
caught unlocking activists phones with
#Cellebrite
forensic tool & planting spyware. Investigation by Amnesty Tech shows Serbian authorities mixing a repression brew of homegrown + foreign-purchased surveillance & forensic tech.. 1/
securitylab.amnesty.org/latest/2024/...
2
74
51
Huh, liars with "flexible" morality lie, as it turns out.
add a skeleton here at some point
12 months ago
0
6
3
reposted by
Dino A. Dai Zovi
Bob Lord
12 months ago
🔒 While we're working to get web traffic to 100% HTTPS, let’s not stop there. What about text messages, calls, and other protocols? It’s time to think bigger and aim for universal encryption—every byte, every pipe, secured. 🌐💬📞 👉 Read more:
https://buff.ly/4iA9i25
0
10
3
Hot off the presses! Our 2nd blog post on how we do app-layer encryption in our back-end services for Cash App:
code.cash.app/encryption-u...
loading . . .
Encryption using data-specific keys
Associating encryption keys with the data they protect
https://code.cash.app/encryption-using-data-keys
12 months ago
2
17
8
reposted by
Dino A. Dai Zovi
Working Families Party 🐺
12 months ago
We’d like to live in a world where we never have to choose between affording healthcare or groceries this month. And neither does our neighbor (even if we don’t always agree with them). That’s all.
0
134
17
reposted by
Dino A. Dai Zovi
Whitney Merrill
12 months ago
Use Signal. Donate to Signal.
add a skeleton here at some point
2
94
37
reposted by
Dino A. Dai Zovi
North Pole Security
12 months ago
Today we're excited to release Santa v2024.11!
github.com/northpolesec...
Highlights: 1. Our initial beta for standalone mode: This lets you authorize binaries using TouchID. So you can live in lockdown mode.
www.youtube.com/watch?v=Hd4t...
loading . . .
Santa Standalone Mode w/Swift UI
YouTube video by Pete Markowsky
https://www.youtube.com/watch?v=Hd4t9mW-C-c
1
1
2
reposted by
Dino A. Dai Zovi
Maya Kaczorowski
12 months ago
What keeps security leaders up at night? I interviewed 57 CISOs and security leaders to find out. The answers were surprisingly consistent: access management challenges, vulnerability management complexity, and limited SaaS visibility. Read the post:
mayakaczorowski.com/blogs/what-s...
loading . . .
What sucks in security? Research findings from 50+ security leaders
I interviewed 57 security leaders and asked them "What sucks in security?" Their top pain points were inconsistent access management, vulnerability prioritization and remediation, and obtaining SaaS l...
https://mayakaczorowski.com/blogs/what-sucks-in-security
2
31
19
reposted by
Dino A. Dai Zovi
Matthew Green
about 1 year ago
“Suing Apple To Force It To Scan iCloud For CSAM Is A Catastrophically Bad Idea”, by
@riana.bsky.social
. Who could have imagined.
www.techdirt.com/2024/08/19/s...
loading . . .
Suing Apple To Force It To Scan iCloud For CSAM Is A Catastrophically Bad Idea
There’s a new lawsuit in Northern California federal court that seeks to improve child safety online but could end up backfiring badly if it gets the remedy it seeks. While the plaintiff’s attorney…
https://www.techdirt.com/2024/08/19/suing-apple-to-force-it-to-scan-icloud-for-csam-is-a-catastrophically-bad-idea/
6
79
43
Pleasantly surprised to see a local news segment like this about consumers using end-to-end encrypted messaging. Make sure to also watch the commentary between newscasters at the end.
www.yahoo.com/news/u-urges...
loading . . .
U.S. Urges Using These Apps for Secure Messaging
Rich DeMuro shares tech headlines on the KTLA 5 Morning News. Topics include secure messaging apps, Walmart buying VIZIO and Cameo opening up it's video greeting platform to smaller creators and influ...
https://www.yahoo.com/news/u-urges-using-apps-secure-140706115.html
about 1 year ago
0
4
1
reposted by
Dino A. Dai Zovi
Thomas
about 1 year ago
My Spotify Wrapped for this year is that I don't use Spotify
8
103
18
In breaking news, water is wet, the sky is blue, and owning/pwning telco infrastructure is valuable for intelligence gathering. It's been a strategic mistake to keep our society vulnerable by fighting e2e encryption rather than embracing it and promoting democratized use of it.
about 1 year ago
0
38
16
reposted by
Dino A. Dai Zovi
Angie Jones
about 1 year ago
Kendrick x SZA. Pre-sale tickets available for Cash App card holders
www.ticketmaster.com/kendrick-lam...
loading . . .
https://www.ticketmaster.com/kendrick-lamar-tickets/artist/1480454
0
12
4
reposted by
Dino A. Dai Zovi
Joseph Lorenzo Hall, PhD
about 1 year ago
Ahem, [taps the end-to-end encryption sign] "U.S. officials urge Americans to use encrypted apps amid cyberattack that exposed live phone calls"
loading . . .
U.S. officials urge Americans to use encrypted apps amid cyberattack that exposed live phone calls
Officials from the FBI and CISA said it was impossible to predict when the telecommunications companies would be fully safe from interlopers.
https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694
0
10
5
reposted by
Dino A. Dai Zovi
Lea Kissner
about 1 year ago
The irony, it burns. Yes, there are tradeoffs to end to end encryption, but it's wild for the FBI to start agreeing with basically the entire security community that it's an often-necessary security message.
www.nbcnews.com/tech/securit...
loading . . .
U.S. officials urge Americans to use encrypted apps amid cyberattack that exposed live phone calls
Officials from the FBI and CISA said it was impossible to predict when the telecommunications companies would be fully safe from interlopers.
https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694
2
69
26
Load more
feeds!
log in