749 Followers
1.5K Following
2.8K Posts
former infosec career @ financial services, healthcare, and telecoms; threat intel, cyber exercises, secops, et al. fan of history and philosophy of science, epistemology, law, logic, critical thinking. Worked on two Ph.D. programs w/o completing; former Multician.
Lippard Bloghttps://lippard.blogspot.com/
GitHubhttps://github.com/lippard661
@TechCrunch He's had a bio that claims "He formerly served as the Executive Director, and Senior Board Advisor on the Ocean X PRIZE project at the X PRIZE Foundation." https://www.huffpost.com/author/al-seckel
Al Seckel | HuffPost

Read the latest work from Al Seckel.

@TechCrunch Epstein-linked con artist Al Seckel used to work with the X Prize Foundation: https://www.flickr.com/photos/50507112@N05/4640754660
Radical Benefit 2010

Flickr
New from 404 Media: CBP tapped into the online advertising ecosystem to track peoples' movements, according to an internal DHS document. Shows for the first time DHS tracked phones via process for putting ads in ordinary apps—video games, fitness apps, many more https://www.404media.co/cbp-tapped-into-the-online-advertising-ecosystem-to-track-peoples-movements/
CBP Tapped Into the Online Advertising Ecosystem To Track Peoples’ Movements

An internal DHS document obtained by 404 Media shows for the first time CBP used location data sourced from the online advertising industry to track phone locations. ICE has bought access to similar tools.

404 Media
Looks like Grokipedia has been expanding out profiles on everybody with a Wikipedia page based on publicly sourced stuff on the web. My Grokipedia page is enormous compared to my Wikipedia page. Its chronology is extremely confused, but otherwise the facts seem accurate (and accurately referenced), though there's a lot of biased language. In my case that seems to be almost entirely in my favor. Stop trying to make me like you, MechaHitler, it won't work. (PDF link to view without visiting Grokipedia: https://www.discord.org/lippard/Grokipedia-Jim-Lippard.pdf )
Took me long enough, but I just realized my WiFi access point logs show a lot of vehicle traffic in my neighborhood. Not quite an ALPR, but I've got date/time stamps, SSIDs, and MAC addresses of passing vehicles with WiFi.
@hardindr @Trott That seems like the most likely explanation.
@Trott Thanks, that could be. I tried again with this: "@JimLippard
0 seconds ago
Ken Thompson's impressions are based on the early days of Multics in the 1960s during Project MAC. My experiences later as a consistent user from 1979 to 1989 and periodic user since then (it's now open source and can run on a laptop via hardware emulation), and as a developer at the Phoenix Multics Development Center from 1983-1989, were quite different. I found Multics to be far more consistent, elegant, and secure than Unix, and worked on the project that earned it the first B2 evaluation from the National Computer Security Center. Reflections on Multics by those who built and used it may be found on Tom Van Vleck's Multicians website."
I made a short comment on the video pointing to www.multicians.org, but it has been deleted.
Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers

David A. Wheeler's Page on Countering 'Trusting Trust' through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers

BTW, see pp. 51-52 (pp. 55-56 of the PDF) for the core insight of Thompson's reflections on trusting trust, a decade before he wrote it. https://csrc.nist.gov/files/pubs/conference/1998/10/08/proceedings-of-the-21st-nissc-1998/final/docs/early-cs-papers/karg74.pdf