Matthew Green(@matthew_d_green) 's Twitter Profileg
Matthew Green

@matthew_d_green

I teach cryptography at Johns Hopkins. Mastodon at [email protected] and BlueSky at https://t.co/GI4QlxYTdk. Bluecheck not my decision ;)

ID:106234268

linkhttp://blog.cryptographyengineering.com calendar_today18-01-2010 22:45:09

84,8K Tweets

150,3K Followers

1,0K Following

Follow People
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

I wonder if a lot of the people who backed OpenAI on the theory it would do what it promised are rethinking their worldview, or if they’re just moving on to the next thing and hoping it goes better.

account_circle
Dan Black(@DanWBlack) 's Twitter Profile Photo

'According to semi-redacted slides published by the us Department of Homeland Security, American officials noticed “SS7 anomalous traffic” that summer which they believed was related to [China's OPM] breach.'

economist.com/science-and-te…

account_circle
Jameson Lopp(@lopp) 's Twitter Profile Photo

We're reaching the point at which you should assume any data you create outside of end to end encrypted communication channels will be used to train AI models.

account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

I don’t like the Google AI overviews. This might actually be the thing that causes me to switch away from Google search.

account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

I assume that every fixed IoT device with a BLE/WiFi MAC address has been geolocated and those maps are extensively used by data brokers to monitor user locations, even for people who are careful with Location privileges on their phone. Convince me I’m wrong.

account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

It’s weird that we’ve decided to build a world that’s run by people who didn’t rebel in high school. How much intelligence does that really demonstrate?

account_circle
Matt Johansen(@mattjay) 's Twitter Profile Photo

Kevin Briggs, a senior advisor at CISA, has publicly revealed ongoing vulnerabilities in U.S. telecom networks.

TL;DR - He has evidence vulns in teleco's are being used to track and spy on U.S. citizens.

Buckle up, here's what we know:

account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

So from what I can tell any app that gets Bluetooth permissions on Android or iOS has nearly-unfiltered access to scan any BLE advertisements. “Location” permissions cause the OS to filter two types of beacon, but every other advertisement is available to the app. Is that right?

account_circle
Riccardo Coluccini [boter](@ORARiccardo) 's Twitter Profile Photo

Matthew Green seems the latest update on the legislation is this one: netzpolitik.org/2024/chatkontr…

Belgium proposing to limit chat control to visual content (images and videos) to get other Member States on board

account_circle
Liberado(@liberad0) 's Twitter Profile Photo

Matthew Green Nobody in my normie circle knows about it. And it will stay like this if the guy in the TV doesn’t talk about it.

account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

The only positive of an H5N1 pandemic is that we won’t have to hear people debating the lab leak theory anymore. (I’m kidding, people will pointlessly debate the lab leak theory til the last human goes extinct.)

account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

If you use Apple devices and iCloud, today would be a great day to turn on Advanced Data Protection and enable end-to-end encryption for all your backups. support.apple.com/en-us/108756#:…

account_circle