Today I've been told that C is memory safe if you're just very neat, that code is documentation, and that expecting protocol specs is a form of bias?
I didn't realize it was 90s week; I'll go get a flannel.
| https://twitter.com/verovaleros | |
| https://www.linkedin.com/in/veronicavalerossaracho/ | |
| About Me | https://verovaleros.github.io/ |
Today I've been told that C is memory safe if you're just very neat, that code is documentation, and that expecting protocol specs is a form of bias?
I didn't realize it was 90s week; I'll go get a flannel.
I could see he was curious, but I knew he had no interest in lengthy history lessons, so I said, “I can do it in 15 minutes. I can give you a 15-minute history lesson that will explain ICE and our current politics.”
“Can I use a timer?” he asked.
I said certainly.
I prepared the lesson, and my nephew started the timer.
For what I told him, click here: https://terikanefield.com/let-my-people-in/

My sixteen-year-old Chilean nephew was curious about what’s going on with ICE. In Chile, the word “conservative” is associated with capitalism, and the word “liberal” is associated with communism. He observed that Donald Trump says he’s a capitalist but doesn’t act like one. I told him things are different here and labels have different meanings because […]
Advanced Malware Traffic Analysis | Singapore, April 21-22
We designed this 2-day intensive training to provide hands-on experience analysing real malware traffic. No textbook scenarios. Real malware, real data, real pressure to make a call.
Advanced Malware Traffic Analysis | Singapore, April 21-22
We designed this 2-day intensive training to provide hands-on experience analysing real malware traffic. No textbook scenarios. Real malware, real data, real pressure to make a call.
What if cybersecurity worked more like the immune system? Not perfect prevention, but detection, response, learning, and adaptation over time. We wrote some thoughts on it!
🔗 Read more: https://www.stratosphereips.org/blog/2026/2/4/rethinking-cybersecurity-immunity

Our research identifies sixteen fundamental principles of biological immunity and translates them into cybersecurity defense architectures that emphasize multi-dimensional coordination over single- point tactics.
New Slips version v1.1.17 is here!
🔗 Read more: https://www.stratosphereips.org/blog/2026/1/30/new-slips-version-v1117-is-here
NetSecGame - A Framework for Training and Evaluating AI Agents in Network Security Environments
ČVUT launches Starting Grant (StG) for early career scientists, a great opportunity for researchers looking to build their own group in Europe or to plan their next steps after a postdoc 👀
🗓️ Submission deadline: 30 March 2026 (23:59 CET)
🔗 Info: https://www.cvut.cz/en/cvut-starting-grant
This is Figure 3 from the 1970 Ware Report, sketching computer security vulnerabilities. Fascinating, and in a way, still relevant. #infosec