RE: https://infosec.exchange/@BleepingComputer/116252647415769342
I had to read this three times, focusing on the first four words. It didn’t get any better.
RE: https://infosec.exchange/@BleepingComputer/116252647415769342
I had to read this three times, focusing on the first four words. It didn’t get any better.
I am sad: I was going to get tickets to the annual Tolkien Lecture here in Oxford. It is Brandon Sanderson this year, and yeah, I know, but it was the only time I was going to get to see the lecture. Tickets went on sale 3m ago at noon British time on Eventbrite. I was logged in, good to go, and the whole event locked up at precisely 12:00 with a flood. I got no tickets and the next refresh showed the whole thing sold out. It was faster than ShmooCon. I can only assume there was a flood of Sanderson fans who smashed into the queue.
Sadface :/
Would anyone else just watch the everliving hell out of a movie about the Choctaw vampire hunters in Sinners?
Aaaaand I have just, in checking my spelling, discovered that there is a HUGE number of people who feel the same.
RE: https://recurse.social/@lindsey/116189776923604763
It’s the same thing many techbros were saying out loud when they founded gig economy companies to do their laundry, cook their food, handle their errands, and clean their homes: “now that I have $app, I don’t need a mom/wife/gf to do it anymore.” It tells you what they thought women were for, all along.
The only feature of 1Password that matters is their business dies overnight if they get hacked so they’ve thought harder about security than anyone you know.
You can’t vibe code that in two evenings no matter how much you ask Claude to “make it secure”
In 2025, I found 3 popular apps leaking sensitive user data thanks to simple security bugs. In this *very* deep-dive for subscribers, this is how I use network analysis tools (like Burp) to understand how apps and websites work & share your data — and how you can, too!
I explain how to get started with Burp and similar browser tools, we'll explore API basics, how to understand network requests, and how to get started. I'll also include examples for you to follow along.

In 2025, journalist Zack Whittaker found three popular apps were leaking sensitive user data. This is how he uses network analysis tools like Burp Suite to understand how apps and websites work and share your data. This is how you can, too.
The new US cyber security strategy just dropped. I'm a Claude user, and I suspiciously inquired of Claude as to the number of em-dashes in this four page document. Then I asked Claude to analyze the probability of this document being LLM-written.
Claude then throws some naughty shade.