Florian Angermeir

24 Followers
47 Following
194 Posts
💻 PhD Student at BTH, Sweden
🔬Research Automated Security Compliance in CSE at fortiss, Germany

views.equals(mine)
Pronounshe/him
Websitehttps://angermeir.me
@michaeldorner Its an interesting take! I wonder whether the observed behavior would actually be a natural one, or very much distorted by a carryover effect? If so, given that this effect would be a global and long-lasting one, could one claim that the observation of the carryover is the actual study goal?
Warning to open source maintainers: the Axios supply chain attack started with some
very sophisticated social engineering targeted at one of their developers https://simonwillison.net/2026/Apr/3/supply-chain-social-engineering/
The Axios supply chain attack used individually targeted social engineering

The Axios team have published a full postmortem on the supply chain attack which resulted in a malware dependency going out in a release the other day, and it involved …

Simon Willison’s Weblog
Stefan Wagner and I, together with many wonderful colleagues from the SE community, are very much looking forward to be welcoming to the Empirical Software Engineering International Week, to be held directly after Oktoberfest in Munich.
A new set of papers, sharing the long-awaited result of several reproducibility and replicability projects, including commentaries, is published today. I look forward to reading the studies, and re-using the data generated! https://www.nature.com/collections/idajfifcfg
Reliable research in the social and behavioural and sciences

Sweeping new investigations probe the replication, robustness and reproducibility of results across the behavioural and social sciences.

Nature

I teach cybersecurity. And I genuinely don't know what to tell my students after this one. Federal reviewers spent years trying to get basic encryption documentation from Microsoft for its GCC High government cloud. They couldn't get it. One reviewer called the system a "pile of spaghetti pies," with data traveling from point A to point B the way you'd get from Chicago to New York: a bus to St. Louis, a ferry to Pittsburgh, and a flight to Newark. Each leg is a potential hijacking. They knew this. They said this out loud in writing. Then they approved it anyway in December 2024, because too many agencies were already using it. 🔐 That's not a security review. That's a hostage negotiation. Two things in this story should make every CISO and CIO uncomfortable:

🧩 Microsoft built its federal cloud on top of decades of legacy code that it apparently can't fully document itself
👮 "Digital escorts" often ex-military with minimal software engineering backgrounds are the firewall between Chinese engineers working on the system and classified U.S. networks 🤦🏻‍♂️

The scariest line in the whole ProPublica investigation isn't the "pile of shit" quote. It's this: FedRAMP determined that refusing authorization wasn't feasible because agencies were already using the product. Read that again. The security review process reached a conclusion based on sunk cost, not risk. Ex Post Facto Fallacy

If that logic holds, the compliance framework is just documentation theater. And right now, CISA is being hollowed out, so there are fewer people left to even run the theater.

https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/
#Cybersecurity #Microsoft #FedRAMP #Leadership #RiskManagement #security #privacy #cloud #infosec

Federal cyber experts called Microsoft's cloud a "pile of shit," approved it anyway

One Microsoft product was approved despite years of concerns about its security.

Ars Technica

In our new article, "When Research Software Goes to Class: Lessons From Embedding Research Software Into Teaching," we discuss the tension between bringing students closer to real-world software engineering and research, and the inherent risks of student exploitation.

Published in Open Research Software Journal and available (open access) on https://openresearchsoftware.metajnl.com/articles/548/files/69c136ece7fa5.pdf together with my brilliant co-authors Andreas Bauer and @angrymeir ❤️

this benefit isn't really that convincing to me tbh

Munich, October 2026 🇩🇪

ESEIW 2026 & ESEM 2026 are coming — and submission preparation should start now!

Full papers, emerging results and vision papers, registered reports, industry papers, journal-first, doctoral symposium — detailed track info is available on the joint website.

Don’t miss the first deadlines 🎯

🔗 https://conf.researchr.org/home/eseiw-2026

#ESEIW2026 #ESEM2026 #EmpiricalSoftwareEngineering

ESEIW 2026

Welcome to the joint website of ESEIW 2026, the Empirical Software Engineering International Week 2026, and ESEM 2026, the 20th International Symposium on Empirical Software Engineering and Measurement.

You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

Claude:

  • Six parallel telemetry pipelines.
  • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
  • Intercom running a persistent WebSocket whether you use it or not.
  • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

ChatGPT:

  • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
  • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
  • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
  • Also runs a proof-of-work challenge before you're allowed to type anything.

Gemini:

  • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
  • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

KETCHUP_DISCOVERY_CARD.
MUSTARD_DISCOVERY_CARD.
MAYO_DISCOVERY_CARD.

Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

All three of these products cost money.
One of them is also running ad infrastructure.

Touch grass. Install @ublockorigin

#infosec #privacy #selfhosted #foss #surveillance