../../MikeMacBook.jpg

RT @MyNameIsByf: We found what looks like a Taken Hydra in the Vex Domain. That can only mean one thing if it’s truly what we saw…

Savat…

(original)

RT @DurhamHealth: STILL SPOTS AVAILABLE….
This hot spot mobile vaccine clinic is open to ALL identified hot spot residents 18+.
This cli…

(original)

RT @SaintSimbaa: Alright destiny friends I am going to shoot my shot and see if we can get an ascendant shard every time we reset our cruci…

(original)

RT @nowthisnews: Britain’s Royal Marines is testing jet suits to help with maritime boarding in place of a helicopter. The suit, which was…

(original)

The Instagram ads Facebook won't show you

Signal at it again We created a multi-variant targeted ad designed to show you the personal data that Facebook collects about you and sells access to. The ad would simply display some of the information collected about the viewer which the advertising platform uses. Facebook was not into that idea. source

RT @sdw: Signal made Instagram ads that shows users how much Facebook knew about them.

Facebook banned them.

“Being transparent about how…

(original)

The series 3 Apple Watch upgrade process needs a lot of attention. Every time I have to upgrade this thing it never has enough space, even though I literally install nothing on my watch, no media, no photos, nothing.

(original)

RT @KimZetter: Signal doesn’t have access to messages/chat list/groups/contacts/stickers/profile name/avatar. As result the only info it ca…

(original)

Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective

Looking at both UFED and Physical Analyzer, though, we were surprised to find that very little care seems to have been given to Cellebrite’s own software security. Industry-standard exploit mitigation defenses are missing, and many opportunities for exploitation are present. And For example, by including a specially formatted but otherwise innocuous file in an app on a device that is then scanned by Cellebrite, it’s possible to execute code that modifies not just the Cellebrite report being created in that scan, but also all previous and future generated Cellebrite reports from all previously scanned devices and all future scanned devices in any arbitrary way (inserting or removing text, email, photos, contacts, files, or any other data), with no detectable timestamp changes or checksum failures.

Got my first Covid vaccine shot, so far so good.

Now, time to go subscribe to Office365.

(original)