Doug Wilson 

196 Followers
303 Following
741 Posts

Washington DC area InfoSec person.

Cyberpunk is here, it's just not evenly distributed.

Mad respect to badge designers for #defcon this year. GB emulator and furry pcb makes me want to hack around after the con like no other official badge has in years past with injecting my own pixel art, GB Studio projects and play with making my own raccoon shell to encase the pcb
Another Brick in the Wall Pt.2 during #linecon - kind of fits #defcon #defcon32
@mortedamos there are a LOT of people, though
@mortedamos not sure, but the line I'm in is inside and moving quickly. But I entered the building from the North side

That was quick #defcon #defcon32

(Honestly, it just could be a hardware problem with the machine, but timing. . . 🤷🤷‍♀️)

I did a bunch of interviews today and something really stuck with me - being told that a lot of politicians are trying to decide if climate change or infrastructure cybersecurity is more pressing.

Climate change deeply impacts geopolitics and military policy. Therefore it is a cybersecurity issue. The DoD has always understood this. You can’t look at the “APTs” and terrorist orgs we deal with and not consider how climate impacts will continue to motivate them.

@gdead keen! Congrats!

Would love to chat if we cross paths, but glad to see you getting this out the door!

🎯🎯🎯
The xz discovery - tied to a small (to a human) variation in sshd response times - reminds me of Clifford Stoll’s 25c accounting discrepancy in the Cuckoo’s Egg…
We undervalue expertise and attention to detail at our own peril.
Hoping @AndresFreundTec gets all the kudos he deserves.

Here's a refresher on how to think about stories in the news from a "secure by design" standpoint. Many stories about compromises of consumer devices and apps are unfortunately overstated or outright hoaxes (what I call "hacklore"). Some sample questions that we should ask:

-Which operating systems, apps, etc. are affected? What versions?

-What did the software/hardware manufacturer say in response to the alleged vulnerability? Are they going to address it in a future version?

-How can users determine if the attackers successfully compromised them?

Questions like this can help us urge technology companies to improve the security of their products. Or, in some cases, it can reveal the alleged allegations as incredibly rare, or even as hoaxes.

Reporters should pay special attention to the full list of questions here:

https://www.cisa.gov/news-events/news/applying-secure-design-thinking-events-news