Adam Shostack  

4.2K Followers
680 Following
11.5K Posts

Author, game designer, technologist, teacher.

Helped to create the CVE and many other things. Fixed autorun for XP. On Blackhat Review board.

Books include Threats: What Every Engineer Should Learn from Star Wars (2023), Threat Modeling: Designing for Security, and The New School of Information Security.

Following back if you have content.

Websitehttps://shostack.org
Latest bookhttps://threatsbook.com
Opsec statusCurrently clean
Youtubehttps://youtube.com/shostack
Iran nuclear deal - Wikipedia

How does all this compare to the Joint Comprehensive Plan of Action?
It is insanely hard to get Google to give authoritative sources about the Constellation Urion. It's all Reddit, Facebook and other tertiary sources.
@CERIAS Congratulations, @spaf!

NASA's photo galley from yesterday's lunar fly-by are bonkers gorgeous

full gallery here: https://www.nasa.gov/gallery/lunar-flyby/

Wendy Nather On Cyber Lessons That Come From The Near-Misses

In CYBR.SEC.CAST Episode 66, Wendy Nather explains why cybersecurity’s biggest lessons aren’t coming from breaches, but from the near-misses no one talks about.

CYBR.SEC.Media
Because we all need something amazing today.
#artemisII

@mhoye

As Margaret explained it to me, NASA wanted the lunar lander's actual landing to be 100% automated with no manual override. She disagreed, and insisted on implementing an override. NASA didn't like the idea but Margaret just went ahead and wrote it.

Of course, on Apollo 11's final approach, the lander was headed for a field of giant boulders. Neil Armstrong used Margaret's code to override the computer and manually divert to the actual, safer, landing point.

@mralancooper @mhoye There’s a great history of the debate in a book “Digital Apollo.” I would love to have heard her story!