Dave "Wear A Goddamn Mask" Cochran 

@dave_cochran@infosec.exchange
614 Followers
737 Following
1.2K Posts

We do not have much in common, you and I - still, this encounter feels special. I hope you will not mind if I consider you a friend.

he/him

enthusiastically anti-nazi

RTs are *absolutely* endorsements unless I'm arguing with whoever got RT'd in the replies - and sometimes even then.

old mastodon profilehttps://mastodon.social/@dave_cochran
404 Media - ICE agents have gained access to a massive database of health and car insurance claims and are using it to track down people they want to deport. https://www.404media.co/ice-is-searching-a-massive-insurance-and-medical-bill-database-to-find-deportation-targets/
ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

The database, called ISO ClaimSearch, is nearly all encompassing and contains details on more than 1.8 billion insurance claims and 58 million medical bills.

404 Media

If you’re a UK resident and/or a UK citizen, please make sure you sign this petition. It’s at almost 80k signatures and it’s got 3 weeks left to get to 100k.

‘Legally enshrine the right of adults to physically transition using NHS services’

https://petition.parliament.uk/petitions/704793

#trans #TransRightAreHumanRights

Petition: Legally enshrine the right of adults to physically transition using NHS services

Introduce a law to legally protect the right of those aged 18 and over to transition using NHS services. This should specifically cover physical transition, including hormone treatment and surgery, as otherwise I believe it could potentially be interpreted as including conversion therapy.

Petitions - UK Government and Parliament

No, computers won’t replace humans to write code for themselves.

Please stop with this nonsense.

What we will see though is tremendous losses in productivity as deskilled programmers will get less and less education and practice—and take longer and longer to make broken AI-generated code work. Meanwhile, AI models will regress from eating their own generated shit when being trained on.

Eventually AI companies will finally run out of investors to scam—and when they disappear or get so expensive they become unaffordable, “prompt engineers” will be asked to not use AI anymore.

What’s gonna happen then?

We’re losing a whole generation of programmers to this while thought leaders in our field are talking about “inevitability” and are jerking off to sci-fi-nostalgia-fueled fantasies of AGI.

Side note: thanks to mastodon for existing because it gives me the confidence to post this without hashtags, because I have absolute faith that a tree signage expert is a thing and i can contact them at a moments notice

Any tree signage experts out there help me understand the meaning of this tree signage - it popped up on a tree i run past a couple of weeks ago. Is it meant to say, “do not cut?”

Confused

Starting today, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android. | Tuta

Gemini AI needs to be disabled on Android or it will override your privacy settings and gain full access to your texts, calls, and WhatsApp - even if you’ve turned off Gemini Apps Activity. But what does this Android update really mean, and how can you stop it? Let’s take a deep dive!

Tuta
“The mosquitoes look like elephants. The food has worms. No toothbrushes. We can’t wash. They took my Bible.”
happy birthday to sent!
Trump regime ICE forces brutally attacked a man who screamed for help at a Walmart in Albuquerque, New Mexico. Walmart staff removed the witness filming, the employees were collaborating with ICE in covering up the incident. #3E #StopICE
×

AI voice clones have hit the White House AGAIN, now impersonating the Secretary of State, Marco Rubio, to other Government officials to try to steal secrets and access. Here is a video of me live demoing how quick and easy it is to clone a voice to hack and how to catch AI voice clone attacks in action!

It takes me 2 minutes total to set up a AI voice clone social engineering attack.
I need about 10-15 seconds of a person’s voice to clone it well, spoof a phone call (change caller ID to display another number -- available on the App Store!) and initiate a voice clone attack via call.

Governments, organizations and individuals need to know how to verify identity of caller outside of caller ID and voice match, now!

Gone are the days of trusting caller ID. We can no longer rely on “knowing someone’s voice” or “knowing someone’s face on video call”, I can clone those in minutes in a live audio call or video call.

Verify identity using another method of communication before providing sensitive data, codes, money, etc.

If they call, you can chat, email, DM -- any other method of communication to verify that person is who they say they are FIRST.

Stay politely paranoid, folks.

@racheltobac ("Stay politely paranoid, folks." always. hopefully. not sure. trying. just because I am aware, does not mean I am aware. )

@racheltobac

Thanks for the heads up. The dangers of AI are changing daily.

@racheltobac

Wow, the first thing I thought this could be used for, is to clone the fanta felons voice and send a message to all his cronies saying something along the lines of

" hey everyone, I'm a total fucktard and I'm stepping down as the prez, for someone to take over who has at least 2 working braincells . . . ."

What a dream that would be !!

@racheltobac

If someone calls, I do not answer. Then I wait to see if they text saying they tried to call. Then I call them back.

If they do not text, I assume it was not important, or a butt-dial. Or, of course, all forged.

In my experience, the spammers will not go thru the effort to both call and text. But, I doubt they will go thru the effort to intercept my call back and defeat my voice recognition step. Especially if I give them a prompt about something that a bot would not know. It is like they have to sign a challenge.

@racheltobac

but i heard that signal forks are totally clean on opsec. :)

the current WH is definitely paranoid but not about operational security...

@racheltobac

thank you R!
still for our beloved 70-80++ family members: could you please drop down second channel verification with most simplistic example, for most practical examples like, dm, direct call, await for next scheduled call, etc?

ps: in my case I try to train my elders that at minimum suspicion, directly react with pre-conceived question, like: your fav kindergarten teacher, your fav meal from your grandma.
pros/cons question/answer vs 2n chann?

@teixi sure! If receive sensitive request call, then text or dm to confirm. If receive sensitive request call, then call back trusted number to thwart spoofing. Those two options work well.
@racheltobac i'm not paranoid, i work in tech.