Profile avatar
drogersuk.bsky.social
Mobile and IoT security, future automotive, viticulture and sim racing. Chair of GSMA Fraud and Security Group.
99 posts 527 followers 243 following
Prolific Poster
Conversation Starter

Serbian student’s Android phone compromised by exploit from Cellebrite https://arstechnica.com/security/2025/02/android-0-day-sold-by-cellebrite-exploited-to-hack-serbian-students-phone/

So much to say on our project here, I keep finding side quests we should do, but for now our focus will be on building out datasets for Shelton Tachygraphy shorthand and open sourcing it. If anyone finds unread shorthand texts, please feel free to point me to them! #earlymodern #ai #opensource

Hmm...

Cellebrite today cut off Serbia. @amnesty.org found police used it to break into civilian phones, install spyware. Cellebrite: It sells only to "democratized nations." Serbia is an authoritarian govt. Cellebrite journalist victim detained by police w/o justification therecord.media/cellebrite-s...

NEW: security researchers found what they say appears to be a backdoor into Eight Sleep beds, which could allow company engineers to SSH into any bed in theory, they could see if you're home or not, if you're sleeping alone or with someone in today's newsletter for @bloomberg.com

Wow: Research covers seven LTE implementations (Open5GS, Magma, OpenAirInterface, Athonet, SD-Core, NextEPC, srsRAN) and three 5G implementations (Open5GS, Magma, OpenAirInterface); we find vulnerabilities in every single LTE/5G implementation tested.

If it looks like there are two different fonts on this clay tablet from ancient Babylon, that’s because there are. In December of 603 BCE, a young scribe named Balāṭa made a faithful copy of a far more ancient inscription of Sîn-Kashid who had ruled Uruk over 1,000 years earlier.

Ganbatte - do your best: www.linkedin.com/pulse/ganbat...

Fascinating “Modest Proposal” style approach.

This is a fascinating vulnerability. The root causes are implementing deterministic signatures instead of hedged, using a general purpose big number implementation, and leaking its API at the crypto layer. JavaScript types are a red herring, could have happened in any language.

The measles outbreak in Texas is reminding me of the public letter Roald Dahl wrote about losing his daughter to measles in 1962, just before the vaccine was publicly available.

“This is nice behaviour, that I write to you again and again, and you pay no attention to me.” This almost 4,000-year-old Babylonian letter in clay is proof that we have been finding ways to say “per my last email” for some time

Expert talking about low chance of Asteroid hitting us, reassures us by reminding us what happened to the dinosaurs

Absolute unit

Love shorthand Reddit

Finally, an article on the decipherment of cuneiform that does justice to the many figures involved, the timeline, competition, and sheer philological grit. Fascinating and colourful synopsis of how we came to be able to read tablets from ancient Mesopotamia www.smithsonianmag.com/history/myst...

D41,616 - issued in 1911 for a design for a "telephone desk stand." #DesignPatents

I've still not forgiven M&S for stopping selling American Hard Gums. Unforgivable.

Kadrey v. Meta: unsealed emails show Meta allegedly torrented 81.7TB+ of data across multiple shadow libraries through the site Anna's Archive for AI training (Ashley Belanger/Ars Technica) Main Link | Techmeme Permalink

Almost done with my Chairmanship of the Fraud and Security Group at GSMA. My last plenary meeting this week in Johannesburg was about "Securing the Future", it was a packed agenda with some really great inputs from across the world. I am proud to have worked with such a committed group of people.

Excellent nominative determinism here 😸😸

Educator slide deck. Over 200 slides with visual examples from every chapter of the book, ‘Deceptive patterns – exposing the tricks tech companies use to control you’ www.deceptive.design/book#deck (You can also read the book free online if you can’t afford to pay)

This sort of stuff depresses me!

Poland arrests former justice minister, accusing him of authorizing the funds used to deploy Pegasus spyware against nearly 600 people, many of whom were in the political opposition. Money to pay for spyware was taken from crime victims fund therecord.media/poland-spywa...

In 1647 the city of York unsuccessfully petitioned parliament for a university, warning of the harm of a north south divide and the “ignorance of illiterate men, through whom that sad proverbe is fulfilled upon us: the blinde leade the blinde and both fall into the ditch.”

Talking to the cats through cat cam...

Leffe in a Guinness glass. Jesus wept

Security flaws in a Subaru web portal let hackers unlock, start ignition or access a year of detailed location history for millions of cars. The flaws are now patched. But they revealed powerful tracking abilities that Subaru employees can still access. www.wired.com/story/subaru...

What to do after loads of drinks on the slope?

Switching between thinking about future 6G security and writing shorthand with a Quill today!

Texas filed another lawsuit today over collection of drivers' data for insurance purposes. This time against Allstate and its subsidiary Arity. www.nytimes.com/2025/01/13/t... It follows our report last year on Arity's collection of driving data via smartphone apps: www.nytimes.com/2024/06/09/t...

Our new research paper just posted! It asks whether dark patterns (manipulative online interfaces) can thwart users who are trying to make privacy-protective choices on a video streaming site. papers.ssrn.com/sol3/papers.... We find that dark patterns are very potent even when users have that goal.

This morning’s sunrise over Los Angeles