Where Chuck once stood, only I will remain.

@chux0r@infosec.exchange
67 Followers
191 Following
849 Posts
Renaissance man. Dad. Pirate. I dreamt I was a Big10 CISO once.
GitHubhttps://github.com/chux0r
Blueskyhttps://bsky.app/profile/chux0r.bsky.social
XwitterNo://abandoned.dont.go.there
@Viss and apparently pedantry is not, at UW.
The boy wonder took the Wii with him when he moved, so naturally I needed to get another one to hack up.
@paulasadoorian hey we didn't have white noise generators back then, this was it, and we LIKED it. (ok not 100% true- I have an entire LP with 2 sides of hi-fidelity thunderstorm noise purchased in 1983, but anyway...)

I've not touched my source for so long, I might need to take a hot second to recall what I was doin, and what might have possessed me to write things the way I did. My comments should help.

Shit who tf wrote these comments.

@Sempf ah yahp. Affirmative
Nothing like throwin your hat in the ring.
@neurovagrant Precisely. And when AI slides off the hype curve, they'll know enough to be long gone, clean as a whistle.
@neurovagrant This made me wonder if the AI engineers, scientists, and execs jumping of their respective ships was a vote for Meta, or a vote for themselves? No shade btw- In an age where having a job at a "very large corp" gives next to no job security (especially Meta), grabbing everything you can for yourself might be the best move you can do at this point. I haven't been in a mega corporate job since the aughts, so I'm trying to imagine the dynamic- maybe I'm off. But if it is what I'm thinking maybe Meta ends up crying about it the hardest in the end. Or not, It's only money- Zuck don't care lol
Pickleball: why the fuck? Discuss.

Breach comms amirite? Turn the same old sleight-of-hand in hopes to downplay things and color your impression of the event. What the hell. Here's a cheat sheet for ya:

"To our knowledge..." -> We have plausible deniability here and are clinging to it for dear life to avoid the accountability that comes with having knowing about facts beforehand and bungling things utterly. In fact, at this very moment we may or may not be in an isolation chamber with our fingers in our ears, screaming LALALALA.

"The information was not accessed..." -> The threat actor definitely established enough permission to grab everything. But we don't seem to have logs of them doin' anything. See also: "To our knowledge..."

"The information was not exfiltrated..." -> We found that stuff on a different net, queued up on external storage hanging off some IT worker's workstation. Also, no logs, but very normal stuff, we assure. Also, also, see "To our knowledge".

"No account numbers or log-in credentials were compromised..." -> Please, please baby Jesus, do not remind them to ask us what information was actually compromised.

"The information was compromised..." -> Who saved those access logs? Fire that guy.