Ever since @jf showed me his keychain nail clippers that fold completely flat, I've been obsessed with finding other tiny useful gadgets for my keychain. I finally collected them all into a video! https://youtu.be/yz7rTtkY8zw
Do I know anyone who knows the right malware analysis tools to determine whether an app accesses any files on the computer or what remote servers it connects to? I want to know more about what this particularly well targeted malware is trying to do.
After some great presentations and discussions at the OAuth Security Workshop and European Identity and Cloud Conference, I wrote up some of my thoughts on OAuth and native app impersonation #eic2022#osw#oauth
Turns out if you're just holding your drone but it's super windy out the wind can catch the propellers and spin them and slice your fingers even if the drone is powered off 😫
12 likes7 replies
There's nothing like being at #EIC2022, a conference all about identity and security, where phishing and hacking have been a major theme across all the talks, and then getting a "is this you?" push on my phone from an IP on a sketchy VPN followed by a password reset email
My video course on OAuth 2.0 just crossed 13,000 students enrolled! 🎉 I never expected so many people would be interested in the "nuts and bolts of OAuth" but I am absolutely thrilled! I hope it's been helpful to you for your work!
Tomorrow, I am going to attempt something extremely risky... going live from the expo hall floor at #NAB2022 right when it opens! Will I have enough cell signal to squeak out a stream? Will my wireless camera and mic work? We will find out at 10am!